ptsunpack-linux
Intel Core i7-2760QM testing with a ASUS K43E v1.0 (K43E.219 BIOS) and ASUS Intel 2nd Generation Core IGP on Arch Linux via the Phoronix Test Suite.
i3-8Gb___1
Processor: Intel Core i3-2310M @ 2.10GHz (2 Cores / 4 Threads), Motherboard: ASUS K43E v1.0 (K43E.219 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 250GB Samsung SSD 860 + 1000GB Western Digital WD10JPVT-22A + 63GB Transcend 64GB, Graphics: ASUS Intel 2nd Generation Core IGP (1100MHz), Audio: Realtek ALC269VB, Network: Qualcomm Atheros AR8151 v2.0 + Intel 3160
OS: Arch Linux, Kernel: 5.6.18.a-1-hardened (x86_64), Desktop: KDE Plasma 5.19.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 10.1.0 + Clang 10.0.0, File-System: ext4, Screen Resolution: 1366x768
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x25
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
i7-8Gb___1
Changed Processor to Intel Core i7-2760QM @ 3.50GHz (4 Cores / 8 Threads).
Changed Disk to 250GB Samsung SSD 860 + 1000GB Western Digital WD10JPVT-22A.
Changed Graphics to ASUS Intel 2nd Generation Core IGP (1300MHz).
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
i3-8Gb___1
Processor: Intel Core i3-2310M @ 2.10GHz (2 Cores / 4 Threads), Motherboard: ASUS K43E v1.0 (K43E.219 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 250GB Samsung SSD 860 + 1000GB Western Digital WD10JPVT-22A + 63GB Transcend 64GB, Graphics: ASUS Intel 2nd Generation Core IGP (1100MHz), Audio: Realtek ALC269VB, Network: Qualcomm Atheros AR8151 v2.0 + Intel 3160
OS: Arch Linux, Kernel: 5.6.18.a-1-hardened (x86_64), Desktop: KDE Plasma 5.19.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 10.1.0 + Clang 10.0.0, File-System: ext4, Screen Resolution: 1366x768
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x25
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 June 2020 22:12 by user johnik.
i7-8Gb___1
Processor: Intel Core i7-2760QM @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS K43E v1.0 (K43E.219 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 250GB Samsung SSD 860 + 1000GB Western Digital WD10JPVT-22A, Graphics: ASUS Intel 2nd Generation Core IGP (1300MHz), Audio: Realtek ALC269VB, Network: Qualcomm Atheros AR8151 v2.0 + Intel 3160
OS: Arch Linux, Kernel: 5.6.18.a-1-hardened (x86_64), Desktop: KDE Plasma 5.19.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 10.1.0 + Clang 10.0.0, File-System: ext4, Screen Resolution: 1366x768
Disk Notes: MQ-DEADLINE / relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x25
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 June 2020 17:49 by user johnik.