7zC27042020

Intel Core i5-3470 testing with a ASUS P8P67 EVO (3602 BIOS) and AMD Radeon X600/X600 SE on Arch Linux via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2004277-NI-7ZC27042064.

7zC27042020ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelCompilerFile-SystemScreen ResolutionBCLK1027zIntel Core i5-3470 @ 5.90GHz (4 Cores)ASUS P8P67 EVO (3602 BIOS)Intel Xeon E3-1200 v2/3rd8GB275GB Crucial_CT275MX3 + 2 x 1000GB Western Digital WD10EADS-00MAMD Radeon X600/X600 SEN173O6Intel 82579V + Realtek RTL-8110SC/8169SCArch Linux5.6.7-arch1-1 (x86_64)GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0ext41600x900OpenBenchmarking.org- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: intel_pstate powersave - CPU Microcode: 0x15- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + tsx_async_abort: Not affected

7zC27042020compress-7zip: Compress Speed TestStandard ErrorStandard DeviationBCLK1027z1743467.000.67%OpenBenchmarking.org

7-Zip Compression

Compress Speed Test

OpenBenchmarking.orgMIPS, More Is Better7-Zip Compression 16.02Compress Speed TestBCLK1027z4K8K12K16K20KSE +/- 67.00, N = 3174341. (CXX) g++ options: -pipe -lpthread


Phoronix Test Suite v10.8.4