Compress-gzip
AMD A12-9720P RADEON R7 12 COMPUTE CORES 4C+8G testing with a LENOVO LNVNB161216 (5QCN22WW BIOS) and AMD Radeon R5/R6/R7 512MB on Ubuntu 19.04 via the Phoronix Test Suite.
test1
Processor: AMD A12-9720P RADEON R7 12 COMPUTE CORES 4C+8G @ 2.70GHz (2 Cores / 4 Threads), Motherboard: LENOVO LNVNB161216 (5QCN22WW BIOS), Chipset: AMD 15h, Memory: 8192 MB + 4096 MB DDR4-1866MT/s, Disk: 1000GB Seagate ST1000LM035-1RK1, Graphics: AMD Radeon R5/R6/R7 512MB (757/933MHz), Audio: AMD Kabini HDMI/DP, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac
OS: Ubuntu 19.04, Kernel: 5.0.0-23-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1366x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
test1
Processor: AMD A12-9720P RADEON R7 12 COMPUTE CORES 4C+8G @ 2.70GHz (2 Cores / 4 Threads), Motherboard: LENOVO LNVNB161216 (5QCN22WW BIOS), Chipset: AMD 15h, Memory: 8192 MB + 4096 MB DDR4-1866MT/s, Disk: 1000GB Seagate ST1000LM035-1RK1, Graphics: AMD Radeon R5/R6/R7 512MB (757/933MHz), Audio: AMD Kabini HDMI/DP, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac
OS: Ubuntu 19.04, Kernel: 5.0.0-23-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1366x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Testing initiated at 11 August 2019 12:26 by user root.