Intel Core i7-3770 testing with a Dell 0M9KCM (A30 BIOS) and Sapphire AMD Radeon RX 560 4GB on Ubuntu 22.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Python Notes: Python 3.10.4
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0M9KCM (A30 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 1000GB Samsung SSD 850 + 250GB 2500BEV External, Graphics: Sapphire AMD Radeon RX 560 4GB (1216/1750MHz), Audio: Realtek ALC269VB, Monitor: PL2792Q, Network: Intel 82579LM
OS: Ubuntu 22.04, Kernel: 5.15.0-47-generic (x86_64), Desktop: GNOME Shell 42.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.42), Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This is a test of any system-installed GLMark2 OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 September 2022 13:23 by user ludovic.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Python Notes: Python 3.10.4
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 September 2022 14:13 by user ludovic.
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 0M9KCM (A30 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 1000GB Samsung SSD 850 + 250GB 2500BEV External, Graphics: Sapphire AMD Radeon RX 560 4GB (1216/1750MHz), Audio: Realtek ALC269VB, Monitor: PL2792Q, Network: Intel 82579LM
OS: Ubuntu 22.04, Kernel: 5.15.0-47-generic (x86_64), Desktop: GNOME Shell 42.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.42), Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-734801M-U02
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 21 September 2022 14:35 by user ludovic.