Intel Core i7-4600U testing with a LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS) and Intel HD 4400 2GB on openSUSE 20210120 via the Phoronix Test Suite.
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule-rdb (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
OS: openSUSE 20210120, Kernel: 5.10.9-cacule-rdb+ (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
OS: openSUSE 20210120, Kernel: 5.10.7-1-default (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 21 January 2021 11:12 by user hamad.
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 21 January 2021 11:31 by user hamad.
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule-rdb (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 21 January 2021 12:23 by user hamad.
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210118, Kernel: 5.10.6-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 21 January 2021 12:41 by user hamad.
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210120, Kernel: 5.10.9-cacule-rdb+ (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 23 January 2021 20:51 by user hamad.
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20A7CTO1WW (GRET40WW 1.17 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8GB, Disk: 128GB TOSHIBA THNSNJ12, Graphics: Intel HD 4400 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel I218-LM + Intel 7260
OS: openSUSE 20210120, Kernel: 5.10.7-1-default (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 20.3.3, Compiler: GCC 10.2.1 20201202 [revision e563687cf9d3d1278f45aaebd03e0f66531076c9], File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x26
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 23 January 2021 21:06 by user hamad.