void musl zstd
tumbleweed x86-64-v3
void musl zstd
Processor: Intel Core i3-4130 @ 3.40GHz (2 Cores / 4 Threads), Motherboard: HP 18E9 (L02 v02.56 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 8GB, Disk: 500GB TOSHIBA DT01ACA0 + 16GB Cruzer Blade + 31GB USB DISK 2.0, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Realtek ALC221, Monitor: SONY TV XV, Network: Realtek RTL8111/8168/8411
OS: VoidLinux rolling, Kernel: 6.3.12_1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, Vulkan: 1.2.246, Compiler: GCC 12.2.0 + Clang 15.0.7, File-System: f2fs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
tumbleweed x86-64-v3
Processor: AMD Ryzen 5 5600G @ 4.46GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME B550-PLUS (2803 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 32GB, Disk: Western Digital WD Blue SN570 250GB + 40GB INTEL SSDSA2CT04, Graphics: ASUS AMD Radeon Vega / Mobile 512MB, Audio: AMD Renoir Radeon HD Audio, Monitor: ASUS VA247, Network: Realtek RTL8111/8168/8411
OS: openSUSE 20230718, Kernel: 6.4.3-1-default (x86_64), Desktop: GNOME Shell 44.3, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 23.1.3 (LLVM 16.0.6 DRM 3.52), Compiler: GCC 13.1.1 20230710 [revision f9781fcf733ca3afe5b5811afd8ecbb18d9d3a11], File-System: btrfs, Screen Resolution: 1920x1080
Kernel Notes: usbcore.autosuspend=-1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Zstd Compression
This test measures the time needed to compress/decompress a sample input file using Zstd compression supplied by the system or otherwise externally of the test profile. Learn more via the OpenBenchmarking.org test page.
void musl zstd
Processor: Intel Core i3-4130 @ 3.40GHz (2 Cores / 4 Threads), Motherboard: HP 18E9 (L02 v02.56 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 8GB, Disk: 500GB TOSHIBA DT01ACA0 + 16GB Cruzer Blade + 31GB USB DISK 2.0, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Realtek ALC221, Monitor: SONY TV XV, Network: Realtek RTL8111/8168/8411
OS: VoidLinux rolling, Kernel: 6.3.12_1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, Vulkan: 1.2.246, Compiler: GCC 12.2.0 + Clang 15.0.7, File-System: f2fs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 11 July 2023 21:43 by user .
tumbleweed x86-64-v3
Processor: AMD Ryzen 5 5600G @ 4.46GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME B550-PLUS (2803 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 32GB, Disk: Western Digital WD Blue SN570 250GB + 40GB INTEL SSDSA2CT04, Graphics: ASUS AMD Radeon Vega / Mobile 512MB, Audio: AMD Renoir Radeon HD Audio, Monitor: ASUS VA247, Network: Realtek RTL8111/8168/8411
OS: openSUSE 20230718, Kernel: 6.4.3-1-default (x86_64), Desktop: GNOME Shell 44.3, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 23.1.3 (LLVM 16.0.6 DRM 3.52), Compiler: GCC 13.1.1 20230710 [revision f9781fcf733ca3afe5b5811afd8ecbb18d9d3a11], File-System: btrfs, Screen Resolution: 1920x1080
Kernel Notes: usbcore.autosuspend=-1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 July 2023 15:10 by user fes.