MitigationONHyperTHOn
Intel Core i5-3320M testing with a LENOVO 4238AP2 (CBET4000 4.8-1577-ge072247e6e BIOS) and Intel Ivybridge Mobile 2GB on Arch Linux via the Phoronix Test Suite.
MONHYON
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 4238AP2 (CBET4000 4.8-1577-ge072247e6e BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 16384MB, Disk: 250GB Crucial_CT250MX2, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Conexant CX20590, Network: Intel 82579LM + Qualcomm Atheros AR9462
OS: Arch Linux, Kernel: 5.1.2-arch1-1-ARCH (x86_64), Desktop: KDE Plasma 5.15.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.2 Mesa 19.0.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
MONHYON
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 4238AP2 (CBET4000 4.8-1577-ge072247e6e BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 16384MB, Disk: 250GB Crucial_CT250MX2, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Conexant CX20590, Network: Intel 82579LM + Qualcomm Atheros AR9462
OS: Arch Linux, Kernel: 5.1.2-arch1-1-ARCH (x86_64), Desktop: KDE Plasma 5.15.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.2 Mesa 19.0.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1600x900
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
Testing initiated at 19 May 2019 12:20 by user sisko.