broadwell_compression_bench
broadwell_compression_bench
broadwell_compression_bench
Processor: Intel Core (16 Cores), Motherboard: Red Hat RHEL-AV (1.13.0-2.module+el8.2.1+7284+aa32a2c4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 4 x 16384 MB RAM, Disk: 79GB, Graphics: bochsdrmfb, Network: Red Hat Virtio device
OS: Debian 9.12, Kernel: 4.9.0-12-amd64 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
RAR Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using RAR/WinRAR compression. Learn more via the OpenBenchmarking.org test page.
System ZLIB Decompression
This test measures the time to decompress a Linux kernel tarball using ZLIB. Learn more via the OpenBenchmarking.org test page.
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
System GZIP Decompression
This simple test measures the time to decompress a gzipped tarball (the Qt5 toolkit source package). Learn more via the OpenBenchmarking.org test page.
XZ Compression
This test measures the time needed to compress a sample file (an Ubuntu file-system image) using XZ compression. Learn more via the OpenBenchmarking.org test page.
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Parallel BZIP2 Compression
This test measures the time needed to compress a file (a .tar package of the Linux kernel source code) using BZIP2 compression. Learn more via the OpenBenchmarking.org test page.
7-Zip Compression
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
Zstd Compression
This test measures the time needed to compress/decompress a sample file (a FreeBSD disk image - FreeBSD-12.2-RELEASE-amd64-memstick.img) using Zstd compression with options for different compression levels / settings. Learn more via the OpenBenchmarking.org test page.
LZ4 Compression
This test measures the time needed to compress/decompress a sample file (an Ubuntu ISO) using LZ4 compression. Learn more via the OpenBenchmarking.org test page.
lzbench
lzbench is an in-memory benchmark of various compressors. The file used for compression is a Linux kernel source tree tarball. Learn more via the OpenBenchmarking.org test page.
Zstd Compression
This test measures the time needed to compress/decompress a sample file (a FreeBSD disk image - FreeBSD-12.2-RELEASE-amd64-memstick.img) using Zstd compression with options for different compression levels / settings. Learn more via the OpenBenchmarking.org test page.
broadwell_compression_bench
Processor: Intel Core (16 Cores), Motherboard: Red Hat RHEL-AV (1.13.0-2.module+el8.2.1+7284+aa32a2c4 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 4 x 16384 MB RAM, Disk: 79GB, Graphics: bochsdrmfb, Network: Red Hat Virtio device
OS: Debian 9.12, Kernel: 4.9.0-12-amd64 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 8 April 2021 18:53 by user root.