upac
Intel Pentium E5300 testing with a ASRock G31M-GS. (P1.70 BIOS) and Intel G33 384MB on Ubuntu 16.04 via the Phoronix Test Suite.
king
Processor: Intel Pentium E5300 @ 2.60GHz (2 Cores), Motherboard: ASRock G31M-GS. (P1.70 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH7, Memory: 3584MB, Disk: 250GB Seagate ST3250318AS + 120GB KINGSTON SV300S3 + 1000GB M3 Portable, Graphics: Intel G33 384MB, Audio: Realtek ALC662 rev1, Monitor: Philips 170S, Network: Realtek RTL8111/8168/8411 + 3Com 3c905C-TX/TX-M + Qualcomm Atheros AR9227
OS: Ubuntu 16.04, Kernel: 4.15.0-46-generic (x86_64), Desktop: MATE 1.12.1, Display Server: X Server 1.19.6, Display Driver: intel 2.99.917, OpenGL: 1.4 Mesa 18.0.5, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Disk Notes: CFQ / data=ordered,relatime,rw
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xa0b
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
king
Processor: Intel Pentium E5300 @ 2.60GHz (2 Cores), Motherboard: ASRock G31M-GS. (P1.70 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH7, Memory: 3584MB, Disk: 250GB Seagate ST3250318AS + 120GB KINGSTON SV300S3 + 1000GB M3 Portable, Graphics: Intel G33 384MB, Audio: Realtek ALC662 rev1, Monitor: Philips 170S, Network: Realtek RTL8111/8168/8411 + 3Com 3c905C-TX/TX-M + Qualcomm Atheros AR9227
OS: Ubuntu 16.04, Kernel: 4.15.0-46-generic (x86_64), Desktop: MATE 1.12.1, Display Server: X Server 1.19.6, Display Driver: intel 2.99.917, OpenGL: 1.4 Mesa 18.0.5, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1280x1024
Disk Notes: CFQ / data=ordered,relatime,rw
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xa0b
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline
Testing initiated at 13 January 2020 17:36 by user alumno.