Intel Core i3 390M testing with a Dell Inspiron N5040 [0R08PM] (A05 BIOS) and Intel Core IGP on Debian 11 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i3 390M @ 2.66GHz (2 Cores / 4 Threads), Motherboard: Dell Inspiron N5040 [0R08PM] (A05 BIOS), Chipset: Intel Core DRAM, Memory: 1 x 4 GB DDR3-1333MT/s HMT351S6CFR8C-H9, Disk: 128GB SATA SSD, Graphics: Intel Core IGP, Audio: IDT 92HD87B1/3, Monitor: DELL E2210, Network: Realtek RTL810xE PCI + Broadcom BCM4313 802.11bgn
OS: Debian 11, Kernel: 5.10.0-19-amd64 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1366x768
Ethr is a cross-platform Golang-written network performance measurement tool developed by Microsoft that is capable of testing multiple protocols and conducting different measurements. Learn more via the OpenBenchmarking.org test page.
Server Address: localhost - Protocol: UDP - Test: Latency - Threads: 4
server1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Latency" for Protocol: "UDP" is not supported.
server 1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Latency" for Protocol: "UDP" is not supported.
Server Address: localhost - Protocol: HTTP - Test: Latency - Threads: 4
server1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
server 1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
Server Address: localhost - Protocol: HTTP - Test: Bandwidth - Threads: 4
server1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
server 1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
Server Address: localhost - Protocol: UDP - Test: Connections/s - Threads: 4
server1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Connections/s" for Protocol: "UDP" is not supported.
server 1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Test: "Connections/s" for Protocol: "UDP" is not supported.
Server Address: localhost - Protocol: HTTP - Test: Connections/s - Threads: 4
server1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
server 1 bessy: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Error: Invalid value "http" specified for parameter "-p".
This test profile uses the open-source fast-cli client to benchmark your Internet connection's upload/download performance and latency against Netflix's fast.com service. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 November 2022 08:29 by user root.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 November 2022 21:03 by user root.
Processor: Intel Core i3 390M @ 2.66GHz (2 Cores / 4 Threads), Motherboard: Dell Inspiron N5040 [0R08PM] (A05 BIOS), Chipset: Intel Core DRAM, Memory: 1 x 4 GB DDR3-1333MT/s HMT351S6CFR8C-H9, Disk: 128GB SATA SSD, Graphics: Intel Core IGP, Audio: IDT 92HD87B1/3, Monitor: DELL E2210, Network: Realtek RTL810xE PCI + Broadcom BCM4313 802.11bgn
OS: Debian 11, Kernel: 5.10.0-19-amd64 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 November 2022 21:16 by user root.