Apple Gentoo Storage Performance
5.8.1 GCC 10.2 volutary elevator=kyber
5.8.1 GCC 10.2 volutary elevator=none
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
5.8.1 GCC 10.2 volutary elevator=kyber
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
FS-Mark
FS_Mark is designed to test a system's file-system performance. Learn more via the OpenBenchmarking.org test page.
Flexible IO Tester
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
5.8.1 GCC 10.2 volutary elevator=none
Disk Notes: NONE / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 10:52 by user tux.
5.8.1 GCC 10.2 volutary elevator=kyber
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB (1200MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Gentoo 2.6, Kernel: 5.8.1-gentoo-x86_64 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.2.0-rc2, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: ext4, Screen Resolution: 2880x1800
Disk Notes: KYBER / noatime,rw,stripe=256
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 18 August 2020 12:02 by user tux.