Comprehensive test and benchmarking platform
The Phoronix Test Suite can be used for simply comparing your
computer's performance or internal quality assurance purposes under
Linux. Results from the Phoronix Test Suite are displayed in a results
viewer with optional support for uploading them to PTS Global. This
software is based upon the internal tools and extensive Linux
benchmarking work done by Phoronix since 2004, with input from tier-one
computer hardware vendors. The Phoronix Test Suite ships with over 50
tests and 20 suites.
- Developed at benchmark
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:RISCV/phoronix-test-suite && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
fix-shebang.patch | 0000000698 698 Bytes | |
harden_phoromatic-client.service.patch | 0000000907 907 Bytes | |
harden_phoromatic-server.service.patch | 0000000902 902 Bytes | |
harden_phoronix-result-server.service.patch | 0000000920 920 Bytes | |
phoronix-test-suite-10.8.4.tar.gz | 0004256978 4.06 MB | |
phoronix-test-suite.changes | 0000009347 9.13 KB | |
phoronix-test-suite.spec | 0000004242 4.14 KB |
Revision 13 (latest revision is 16)
Dominique Leuenberger (dimstar_suse)
accepted
request 1001260
from
Martin Liška (marxin)
(revision 13)
- Remove ownership of man1 folder. - Update to version 10.8.4: * pts-core: Allow sub-folders within PTS_EXTRA_SYSTEM_LOGS_DIR when uploading to Phoromatic server * pts-core: Fix TOTAL_LOOP_TIME handling * pts-core: openSUSE external dependency handling fixes * phodevi: Support for reporting video BIOS version * phodevi: Budgie desktop version detection * phodevi: Avoid deprecated wmic usage on Windows * phoromatic: Input sanitization updates in the result viewer - Add fix-shebang.patch that fixes a bad shebang. - Use autosetup. - version update to 10.8.2 * Fix CVE-2022-0157: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') * Fix CVE-2022-0196, CVE-2022-0197, CVE-2022-0238: Cross-Site Request Forgery * Fix CVE-2022-0571: Cross-site Scripting (XSS) * For detailed list of changes see ChangeLog
Comments 0