Browser Power
Intel Xeon E3-1505M v5 testing with a Dell 08R8KJ (1.12.0 BIOS) and Intel HD P530 on Gentoo/Linux via the Phoronix Test Suite.
Pre
Processor: Intel Core i7-8550U @ 4.00GHz (4 Cores / 8 Threads), Motherboard: Dell 0H0VG3 (1.10.0 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: PM961 NVMe SAMSUNG 256GB, Graphics: Intel UHD 620 3GB (1150MHz), Audio: Realtek ALC3271, Network: Qualcomm Atheros QCA6174 802.11ac
OS: Ubuntu 19.10, Kernel: 5.4.0-050400rc7-generic (x86_64) 20191110, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Post
OS: Ubuntu 19.10, Kernel: 5.4.0-050400rc8-generic (x86_64) 20191117, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Vuln
Environment Notes: MESA_LOADER_DRIVER_OVERRIDE=iris
Processor Notes: Scaling Governor: intel_cpufreq schedutil
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
VulnFloating
VulnDebug
VulnChrome79
Processor: Intel Xeon E3-1505M v5 @ 3.70GHz (4 Cores / 8 Threads), Motherboard: Dell 08R8KJ (1.12.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB, Graphics: Intel HD P530 (1050MHz), Audio: Realtek ALC3266, Monitor: DELL U2410, Network: Intel 8260
OS: Gentoo/Linux, Kernel: 5.3.11-ck (x86_64), Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 19.3.0-rc3, Compiler: GCC 9.2.0 + Clang 9.0.0 + LLVM 9.0.0, File-System: ext4, Screen Resolution: 1920x1200
Selenium
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
System Power Consumption Monitor
Selenium
Pre
Processor: Intel Core i7-8550U @ 4.00GHz (4 Cores / 8 Threads), Motherboard: Dell 0H0VG3 (1.10.0 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: PM961 NVMe SAMSUNG 256GB, Graphics: Intel UHD 620 3GB (1150MHz), Audio: Realtek ALC3271, Network: Qualcomm Atheros QCA6174 802.11ac
OS: Ubuntu 19.10, Kernel: 5.4.0-050400rc7-generic (x86_64) 20191110, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 19 November 2019 08:28 by user phoronix.
Post
Processor: Intel Core i7-8550U @ 4.00GHz (4 Cores / 8 Threads), Motherboard: Dell 0H0VG3 (1.10.0 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: PM961 NVMe SAMSUNG 256GB, Graphics: Intel UHD 620 3GB (1150MHz), Audio: Realtek ALC3271, Network: Qualcomm Atheros QCA6174 802.11ac
OS: Ubuntu 19.10, Kernel: 5.4.0-050400rc8-generic (x86_64) 20191117, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.1, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6
Python Notes: Python 2.7.17rc1 + Python 3.7.5rc1
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 November 2019 08:46 by user phoronix.
Vuln
Environment Notes: MESA_LOADER_DRIVER_OVERRIDE=iris
Processor Notes: Scaling Governor: intel_cpufreq schedutil
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 19 November 2019 21:36 by user alex.
VulnFloating
Environment Notes: MESA_LOADER_DRIVER_OVERRIDE=iris
Processor Notes: Scaling Governor: intel_cpufreq schedutil
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 19 November 2019 21:43 by user alex.
VulnDebug
Environment Notes: MESA_LOADER_DRIVER_OVERRIDE=iris
Processor Notes: Scaling Governor: intel_cpufreq schedutil
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 19 November 2019 21:46 by user alex.
VulnChrome79
Processor: Intel Xeon E3-1505M v5 @ 3.70GHz (4 Cores / 8 Threads), Motherboard: Dell 08R8KJ (1.12.0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO Plus 1TB, Graphics: Intel HD P530 (1050MHz), Audio: Realtek ALC3266, Monitor: DELL U2410, Network: Intel 8260
OS: Gentoo/Linux, Kernel: 5.3.11-ck (x86_64), Display Server: X Server 1.20.5, Display Driver: intel 2.99.917, OpenGL: 4.6 Mesa 19.3.0-rc3, Compiler: GCC 9.2.0 + Clang 9.0.0 + LLVM 9.0.0, File-System: ext4, Screen Resolution: 1920x1200
Environment Notes: MESA_LOADER_DRIVER_OVERRIDE=iris
Processor Notes: Scaling Governor: intel_cpufreq schedutil
Python Notes: Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 19 November 2019 21:53 by user alex.