2023-12-19-1846
Intel Core i5-4670S testing with a LENOVO SHARKBAY (FBKTDFAUS BIOS) and Intel ARUBA on SystemRescue 10.01 via the Phoronix Test Suite.
TOSHIBA THNSNJ12
Processor: Intel Core i5-4670S @ 3.80GHz (4 Cores), Motherboard: LENOVO SHARKBAY (FBKTDFAUS BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4 GB DDR3-1600MT/s RMR5030MN68F9F1600, Disk: 128GB TOSHIBA THNSNJ12 + 62GB USB Flash Disk, Graphics: Intel ARUBA (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x1d
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
hdparm Timed Disk Reads
The hdparm utility is used for simple benchmarking the system's hard drive. Learn more via the OpenBenchmarking.org test page.
CPU Temperature Monitor
System Temperature Monitor
TOSHIBA THNSNJ12
Processor: Intel Core i5-4670S @ 3.80GHz (4 Cores), Motherboard: LENOVO SHARKBAY (FBKTDFAUS BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4 GB DDR3-1600MT/s RMR5030MN68F9F1600, Disk: 128GB TOSHIBA THNSNJ12 + 62GB USB Flash Disk, Graphics: Intel ARUBA (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=32k,logbufs=8,noquota,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x1d
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 December 2023 18:46 by user root.