io-scheduler
Intel Core i7-8700K testing with a Gigabyte Z370 AORUS Gaming 7 (F6 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on ManjaroLinux 20.2.1 via the Phoronix Test Suite.
manual
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde - Thermald 2.4.1
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
automatic
manual-2
Processor: Intel Core i7-8700K @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z370 AORUS Gaming 7 (F6 BIOS), Chipset: Intel 8th Gen Core, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB + 240GB KINGSTON SA400S3 + 120GB KINGSTON SA400S3, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1284/1750MHz), Audio: Realtek ALC1220, Monitor: Acer X34 P + D27QO, Network: Intel I219-V + Qualcomm Atheros Killer E2500
OS: ManjaroLinux 20.2.1, Kernel: 5.10.12-xanmod1-cacule-1-cacule (x86_64), Desktop: KDE Frameworks 5.78.0, Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Vulkan: 1.2.145, Compiler: Clang 11.0.1, File-System: ext4, Screen Resolution: 4880x2560
hdparm Timed Disk Reads
The hdparm utility is used for simple benchmarking the system's hard drive. Learn more via the OpenBenchmarking.org test page.
IOR
IOR is a parallel I/O storage benchmark. Learn more via the OpenBenchmarking.org test page.
LevelDB
LevelDB is a key-value storage library developed by Google that supports making use of Snappy for data compression and has other modern features. Learn more via the OpenBenchmarking.org test page.
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
manual
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde - Thermald 2.4.1
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 31 January 2021 19:06 by user montazar.
automatic
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde - Thermald 2.4.1
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 31 January 2021 19:14 by user montazar.
manual-2
Processor: Intel Core i7-8700K @ 4.90GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z370 AORUS Gaming 7 (F6 BIOS), Chipset: Intel 8th Gen Core, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB + 240GB KINGSTON SA400S3 + 120GB KINGSTON SA400S3, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1284/1750MHz), Audio: Realtek ALC1220, Monitor: Acer X34 P + D27QO, Network: Intel I219-V + Qualcomm Atheros Killer E2500
OS: ManjaroLinux 20.2.1, Kernel: 5.10.12-xanmod1-cacule-1-cacule (x86_64), Desktop: KDE Frameworks 5.78.0, Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 4.6 Mesa 20.3.3 (LLVM 11.0.1), Vulkan: 1.2.145, Compiler: Clang 11.0.1, File-System: ext4, Screen Resolution: 4880x2560
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / noatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde - Thermald 2.4.1
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 31 January 2021 19:40 by user montazar.