Intel Core i3-8100T testing with a Dell 0NV0M7 (1.2.22 BIOS) and Intel Gen9 on Ubuntu 20.04 via the Phoronix Test Suite.
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Processor: Intel Core i3-4160T @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 8076 v1.01 (02.28 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4096 MB DDR3-1600MT/s, Disk: 256GB ADATA SX8200PNP + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: Ubuntu 20.04, Kernel: 5.7.0-050700rc5-generic (x86_64) 20200510, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 1 x 4096 MB DDR4-2666MT/s M471A5244CB0-CTD, Disk: 128GB SAMSUNG MZALQ128HBHQ-000L2 + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.6-050706-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 May 2020 13:23 by user root.
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 May 2020 08:02 by user root.
Processor: Intel Core i3-4160T @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 8076 v1.01 (02.28 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4096 MB DDR3-1600MT/s, Disk: 256GB ADATA SX8200PNP + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: Ubuntu 20.04, Kernel: 5.7.0-050700rc5-generic (x86_64) 20200510, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 May 2020 08:09 by user root.
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 1 x 4096 MB DDR4-2666MT/s M471A5244CB0-CTD, Disk: 128GB SAMSUNG MZALQ128HBHQ-000L2 + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.6-050706-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 July 2020 19:26 by user root.