Disk1
Intel Pentium III testing with a Intel L440GX+ (L440GX0.86B.0125.P13.0006061627 BIOS) and Cirrus Logic GD 5480 512MB on Debian 9.11 via the Phoronix Test Suite.
2 x 18GB DNES-318350W
Processor: Intel Pentium III @ 0.80GHz (2 Cores), Motherboard: Intel L440GX+ (L440GX0.86B.0125.P13.0006061627 BIOS), Chipset: Intel 440GX 82443GX, Memory: 1 x 512 MB EDRAM, Disk: 2 x 18GB DNES-318350W, Graphics: LLVMpipe, Monitor: LCD73V, Network: Intel 82557/8/9/0/1
OS: Debian 9.11, Kernel: 4.9.0-11-686-pae (i686), Desktop: LXDE 0.9.3, Display Server: X Server 1.19.2, Display Driver: modesetting 1.19.2, OpenGL: 3.3 Mesa 13.0.6 Gallium 0.4 (LLVM 3.9 128 bits), File-System: ext4, Screen Resolution: 800x600
Disk Notes: CFQ / data=ordered,errors=remount-ro,relatime,rw
Processor Notes: CPU Microcode: 0xc
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Unpacking The Linux Kernel
This test measures how long it takes to extract the .tar.xz Linux kernel package. Learn more via the OpenBenchmarking.org test page.
2 x 18GB DNES-318350W
Processor: Intel Pentium III @ 0.80GHz (2 Cores), Motherboard: Intel L440GX+ (L440GX0.86B.0125.P13.0006061627 BIOS), Chipset: Intel 440GX 82443GX, Memory: 1 x 512 MB EDRAM, Disk: 2 x 18GB DNES-318350W, Graphics: LLVMpipe, Monitor: LCD73V, Network: Intel 82557/8/9/0/1
OS: Debian 9.11, Kernel: 4.9.0-11-686-pae (i686), Desktop: LXDE 0.9.3, Display Server: X Server 1.19.2, Display Driver: modesetting 1.19.2, OpenGL: 3.3 Mesa 13.0.6 Gallium 0.4 (LLVM 3.9 128 bits), File-System: ext4, Screen Resolution: 800x600
Disk Notes: CFQ / data=ordered,errors=remount-ro,relatime,rw
Processor Notes: CPU Microcode: 0xc
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 January 2020 10:14 by user root.