Intel Core i5-3470 testing with a ECS H61H2-I3 v1.0 (4.6.5 BIOS) and ECS Intel Ivybridge Desktop 2GB on Ubuntu 19.10 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Motherboard: ECS H61H2-I3 v1.0 (4.6.5 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 4096MB, Disk: 120GB Samsung SSD 850, Graphics: ECS Intel Ivybridge Desktop 2GB (1100MHz), Audio: VIA VT1705, Monitor: DELL S2409W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.9.0-050900rc8daily20201010-generic (x86_64) 20201009, Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.2 Mesa 19.2.8, Vulkan: 1.1.102, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
This is a test profile for running the cryptsetup benchmark to report on the system's cryptography performance. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Warsow, a popular open-source first-person shooter. This game uses the QFusion engine. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 2 January 2021 18:39 by user phoronix.
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 2 January 2021 20:13 by user phoronix.
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Motherboard: ECS H61H2-I3 v1.0 (4.6.5 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 4096MB, Disk: 120GB Samsung SSD 850, Graphics: ECS Intel Ivybridge Desktop 2GB (1100MHz), Audio: VIA VT1705, Monitor: DELL S2409W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.9.0-050900rc8daily20201010-generic (x86_64) 20201009, Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.2 Mesa 19.2.8, Vulkan: 1.1.102, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 1.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 2 January 2021 20:42 by user phoronix.