Tests for a future article. Intel Core i7-2700K testing with a BIOSTAR B75MU3B v5.0 (4.6.5 BIOS) and Intel HD 3000 2GB on Ubuntu 21.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-2700K @ 3.90GHz (4 Cores / 8 Threads), Motherboard: BIOSTAR B75MU3B v5.0 (4.6.5 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 525GB Crucial CT525MX3, Graphics: Intel HD 3000 2GB (1350MHz), Audio: Realtek ALC662 rev1, Monitor: G237HL, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 21.04, Kernel: 5.11.0-18-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server + Wayland, OpenGL: 3.3 Mesa 21.2.0-devel (git-849ab4e 2021-06-17 hirsute-oibaf-ppa), Vulkan: 1.1.180, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Unvanquished is a modern fork of the Tremulous first person shooter. Unvanquished is powered by the Daemon engine, a combination of the ioquake3 engine with the graphically-beautiful XreaL engine. Unvanquished supports a modern OpenGL 3 renderer and other advanced graphics features for this open-source game. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 June 2021 14:53 by user phoronix.
Processor: Intel Core i7-2700K @ 3.90GHz (4 Cores / 8 Threads), Motherboard: BIOSTAR B75MU3B v5.0 (4.6.5 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 525GB Crucial CT525MX3, Graphics: Intel HD 3000 2GB (1350MHz), Audio: Realtek ALC662 rev1, Monitor: G237HL, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 21.04, Kernel: 5.11.0-18-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server + Wayland, OpenGL: 3.3 Mesa 21.2.0-devel (git-849ab4e 2021-06-17 hirsute-oibaf-ppa), Vulkan: 1.1.180, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 June 2021 16:16 by user phoronix.