c
Intel Core i7-2600K testing with a ASRock Z68 Extreme4 Gen3 (P2.30 BIOS) and Intel 2nd Generation Core IGP on Solus 4.1 via the Phoronix Test Suite.
phobos
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASRock Z68 Extreme4 Gen3 (P2.30 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 4 x GB DDR3-1600MT/s Kingston KHX1600C9D3, Disk: 120GB OCZ AGILITY3 + 2000GB Western Digital WD20EARX-00P + 2000GB SAMSUNG HD204UI + 500GB Seagate ST3500320AS, Graphics: Intel 2nd Generation Core IGP (1350MHz), Audio: Realtek ALC892, Monitor: SAMSUNG, Network: Broadcom NetLink BCM57781 PCIe
OS: Solus 4.1, Kernel: 5.10.5-167.current (x86_64), Desktop: Budgie, Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 3.3 Mesa 20.2.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-solus-linux --enable-__cxa_atexit --enable-cet --enable-clocale=gnu --enable-default-ssp --enable-gnu-indirect-function --enable-gold --enable-languages=c,c++,fortran --enable-ld=default --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --target=x86_64-solus-linux --with-arch_32=i686 --with-gcc-major-version-only --with-gnu-ld --with-linker-hash-style=gnu --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x2f
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
7-Zip Compression
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
phobos
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASRock Z68 Extreme4 Gen3 (P2.30 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 4 x GB DDR3-1600MT/s Kingston KHX1600C9D3, Disk: 120GB OCZ AGILITY3 + 2000GB Western Digital WD20EARX-00P + 2000GB SAMSUNG HD204UI + 500GB Seagate ST3500320AS, Graphics: Intel 2nd Generation Core IGP (1350MHz), Audio: Realtek ALC892, Monitor: SAMSUNG, Network: Broadcom NetLink BCM57781 PCIe
OS: Solus 4.1, Kernel: 5.10.5-167.current (x86_64), Desktop: Budgie, Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 3.3 Mesa 20.2.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-solus-linux --enable-__cxa_atexit --enable-cet --enable-clocale=gnu --enable-default-ssp --enable-gnu-indirect-function --enable-gold --enable-languages=c,c++,fortran --enable-ld=default --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --target=x86_64-solus-linux --with-arch_32=i686 --with-gcc-major-version-only --with-gnu-ld --with-linker-hash-style=gnu --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x2f
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 January 2021 23:56 by user root.