Intel Core i5-3427U testing with a GOOGLE Link v1.0 and Intel Ivybridge Mobile 2GB on Ubuntu 19.10 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Processor: Intel Core i5-3427U @ 2.80GHz (2 Cores / 4 Threads), Motherboard: GOOGLE Link v1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 4096MB, Disk: 32GB SanDisk SSD i100, Graphics: Intel Ivybridge Mobile 2GB (1150MHz), Audio: Creative CA0132, Network: Qualcomm Atheros AR9462
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: KDE Plasma 5.16.5, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.2 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 2560x1700
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 9 November 2019 02:10 by user jhamby.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 9 November 2019 02:20 by user jhamby.
Processor: Intel Core i5-3427U @ 2.80GHz (2 Cores / 4 Threads), Motherboard: GOOGLE Link v1.0, Chipset: Intel 3rd Gen Core DRAM, Memory: 4096MB, Disk: 32GB SanDisk SSD i100, Graphics: Intel Ivybridge Mobile 2GB (1150MHz), Audio: Creative CA0132, Network: Qualcomm Atheros AR9462
OS: Ubuntu 19.10, Kernel: 5.3.0-19-generic (x86_64), Desktop: KDE Plasma 5.16.5, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.2 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 2560x1700
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 9 November 2019 02:39 by user jhamby.