kernel-hp
Intel Core i3-8100T testing with a Dell 0NV0M7 (1.2.22 BIOS) and Intel Gen9 on Ubuntu 20.04 via the Phoronix Test Suite.
Intel Core i3-4160T
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
2 x 4096 MB DDR3-1600MT
Intel Core i3-4160T - Intel 4th Generation Core IGP -
Processor: Intel Core i3-4160T @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 8076 v1.01 (02.28 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4096 MB DDR3-1600MT/s, Disk: 256GB ADATA SX8200PNP + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: Ubuntu 20.04, Kernel: 5.7.0-050700rc5-generic (x86_64) 20200510, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Intel Core i3-8100T - Intel Gen9 - Dell 0NV0M7
Kernel Notes: i915.modeset=1 drm.debug=0x06
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
1 x 4096 MB DDR4-2666MT
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 1 x 4096 MB DDR4-2666MT/s M471A5244CB0-CTD, Disk: 128GB SAMSUNG MZALQ128HBHQ-000L2 + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.6-050706-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
2 x 8192 MB DDR4-2666MT
Changed Memory to 2 x 8192 MB DDR4-2666MT/s F4-2666C19-8GRS.
Changed Disk to 500GB KINGSTON SA2000M8500G + 2000GB Seagate ST2000LM007-1R81.
Processor Change: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9a
Intel Core i3-8100T
OS: Ubuntu 20.04, Kernel: 5.7.8-050708-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
Intel Core i3-4160T
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 May 2020 13:23 by user root.
2 x 4096 MB DDR3-1600MT
Kernel Notes: i915.modeset=1
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 May 2020 08:02 by user root.
Intel Core i3-4160T - Intel 4th Generation Core IGP -
Processor: Intel Core i3-4160T @ 3.10GHz (2 Cores / 4 Threads), Motherboard: HP 8076 v1.01 (02.28 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4096 MB DDR3-1600MT/s, Disk: 256GB ADATA SX8200PNP + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel 4th Generation Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: Ubuntu 20.04, Kernel: 5.7.0-050700rc5-generic (x86_64) 20200510, Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 May 2020 08:09 by user root.
Intel Core i3-8100T - Intel Gen9 - Dell 0NV0M7
Kernel Notes: i915.modeset=1 drm.debug=0x06
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 July 2020 19:26 by user root.
1 x 4096 MB DDR4-2666MT
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 1 x 4096 MB DDR4-2666MT/s M471A5244CB0-CTD, Disk: 128GB SAMSUNG MZALQ128HBHQ-000L2 + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.6-050706-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 1 July 2020 19:29 by user root.
2 x 8192 MB DDR4-2666MT
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 8192 MB DDR4-2666MT/s F4-2666C19-8GRS, Disk: 500GB KINGSTON SA2000M8500G + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.6-050706-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 13 July 2020 09:05 by user root.
Intel Core i3-8100T
Processor: Intel Core i3-8100T @ 3.10GHz (4 Cores), Motherboard: Dell 0NV0M7 (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 8192 MB DDR4-2666MT/s F4-2666C19-8GRS, Disk: 500GB KINGSTON SA2000M8500G + 2000GB Seagate ST2000LM007-1R81, Graphics: Intel Gen9 (1100MHz), Audio: Realtek ALC3234, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.7.8-050708-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Kernel Notes: i915.modeset=1 drm.debug=0x06
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 15 July 2020 09:15 by user root.