deadpool-compress-gzip-results
AMD Ryzen 5 1600 Six-Core testing with a ASUS PRIME B450M-A II (3002 BIOS) and Gigabyte NVIDIA GeForce GTX 1650 4GB on Ubuntu 20.04 via the Phoronix Test Suite.
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671509727
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671510098
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671511101
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671846522
Processor: AMD Ryzen 5 1600 Six-Core @ 3.20GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME B450M-A II (3002 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1024GB KLEVV CRAS C710 M.2 NVMe SSD 1TB, Graphics: Gigabyte NVIDIA GeForce GTX 1650 4GB, Audio: NVIDIA Device 10fa, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.15.0-56-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Display Driver: NVIDIA, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671509727
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 December 2022 23:17 by user ahmad.
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671510098
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 December 2022 23:23 by user ahmad.
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671511101
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 December 2022 23:39 by user ahmad.
Desktop-x86_64-Ubuntu-20.04-pts-compress-gzip-deadpool-1671846522
Processor: AMD Ryzen 5 1600 Six-Core @ 3.20GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME B450M-A II (3002 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1024GB KLEVV CRAS C710 M.2 NVMe SSD 1TB, Graphics: Gigabyte NVIDIA GeForce GTX 1650 4GB, Audio: NVIDIA Device 10fa, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.15.0-56-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Display Driver: NVIDIA, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 December 2022 20:52 by user ahmad.