This is an old revision of PhoronixTestSuite from 17.08.2019 07:31 edited by EvaggelosBalaskas.

Phoronix Test Suite


$ sudo pacman -S php

(bash
curl -sL https://github.com/phoronix-test-suite/phoronix-test-suite/archive/v8.8.1.tar.gz | tar xzf - && cd phoronix-test-suite*

myhomepc


$ phoronix-test-suite system-info

Phoronix Test Suite v8.8.1
System Information


  PROCESSOR:          Intel Core i7-2600 @ 3.80GHz
    Core Count:       4                      
    Thread Count:     8                      
    Extensions:       SSE 4.2 + AVX          
    Cache Size:       8192 KB                
    Microcode:        0x28                   
    Scaling Driver:   intel_pstate powersave 

  GRAPHICS:           Intel 2nd Generation Core IGP
    Frequency:        1350MHz            
    Display Driver:   modesetting 1.20.3 
    Monitor:          22EA63             
    Screen:           1920x1080          

  MOTHERBOARD:        Gigabyte B75M-D3H
    BIOS Version:     F14                            
    Chipset:          Intel 2nd Generation Core DRAM 
    Audio:            Realtek ALC887-VD              
    Network:          Realtek RTL8111/8168/8411      

  MEMORY:             4 x 4096 MB DDR3-1333MT/s HMT351U6CFR8C-PB

  DISK:               120GB SanDisk SDSSDA12
                      + 1000GB Western Digital WD10EURX-63F
                      + 1000GB Western Digital WD10EZRX-00A
                      + 2 x 1000GB Seagate ST1000DX002-2DV1
    File-System:      btrfs                                           
    Mount Options:    relatime rw space_cache ssd subvol=/ subvolid=5 
    Disk Scheduler:   MQ-DEADLINE                                     

  OPERATING SYSTEM:   Arch rolling
    Kernel:           4.19.66-1-lts (x86_64)                                                               
    Display Server:   X Server 1.20.3                                                                      
    Security:         l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable     
                      + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable              
                      + meltdown: Mitigation of PTI                                                        
                      + spec_store_bypass: Vulnerable                                                      
                      + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization 
                      + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling