kto

Intel Core i5-6600K testing with a MSI Z170A-G45 GAMING (MS-7977) v1.0 (2.D0 BIOS) and ASUS NVIDIA GeForce GTX 650 Ti 1GB on Arch rolling via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2206215-NE-KTO99034855
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel Core i5-6600K
June 22 2022
 


ktoOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-6600K @ 4.30GHz (4 Cores)MSI Z170A-G45 GAMING (MS-7977) v1.0 (2.D0 BIOS)Intel Xeon E3-1200 v5/E3-150016GB128GB TS128GSSD370S + 120GB SPCC Solid State + 1000GB Seagate ST1000DM003-1SB1ASUS NVIDIA GeForce GTX 650 Ti 1GBRealtek ALC11502590G4Qualcomm Atheros Killer E2400Arch rolling5.18.3-262-tkg-bmq (x86_64)Openbox 3.6.1X Server 1.21.1.3NVIDIA 470.129.064.6.0GCC 12.1.0f2fs1920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionKto BenchmarksSystem Logs- Transparent Huge Pages: always- --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu - Scaling Governor: intel_cpufreq ondemand (EPP: balance_performance) - CPU Microcode: 0xc6- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable

GNU MPC

GNU MPC is a C library for the arithmetic of complex numbers. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgGlobal Score, More Is BetterGNU MPC 1.1.0Multi-Precision BenchmarkIntel Core i5-6600K2K4K6K8K10KSE +/- 40.00, N = 3100601. (CC) gcc options: -lm -O2 -pedantic -fomit-frame-pointer -m64 -mtune=skylake -march=broadwell -MT -MD -MP -MF