compressgzipbenchmark
Intel Xeon E5-2689 0 testing on Ubuntu 20.04 via the Phoronix Test Suite.
compressgzipbenchmark
Processor: Intel Xeon E5-2689 0 @ 3.60GHz (8 Cores / 16 Threads), Motherboard: Intel X79 (X79GA00K BIOS), Chipset: Intel Xeon E5/Core, Memory: 16GB, Disk: 500GB Western Digital WD5000LPVX-6, Audio: Realtek ALC883, Network: Realtek RTL810xE PCI
OS: Ubuntu 20.04, Kernel: 5.8.0-43-generic (x86_64), Display Server: X Server 1.20.8, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x71a
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
compressgzipbenchmark
Processor: Intel Xeon E5-2689 0 @ 3.60GHz (8 Cores / 16 Threads), Motherboard: Intel X79 (X79GA00K BIOS), Chipset: Intel Xeon E5/Core, Memory: 16GB, Disk: 500GB Western Digital WD5000LPVX-6, Audio: Realtek ALC883, Network: Realtek RTL810xE PCI
OS: Ubuntu 20.04, Kernel: 5.8.0-43-generic (x86_64), Display Server: X Server 1.20.8, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x71a
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 February 2021 10:07 by user fozimus.