Intel Core i5-3320M testing with a LENOVO 2347G2U (G1ETC2WW 2.82 BIOS) and Intel HD 4000 IVB GT2 2GB on Fedora Linux 37 via the Phoronix Test Suite.
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 2347G2U (G1ETC2WW 2.82 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 12GB, Disk: 240GB ADATA SU635, Graphics: Intel HD 4000 IVB GT2 2GB, Audio: Realtek ALC3202, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Fedora Linux 37, Kernel: 6.1.12-200.fc37.x86_64 (x86_64), Desktop: GNOME Shell 43.3, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 22.3.5, Compiler: GCC 12.2.1 20221121, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
OS: Fedora Linux 37, Kernel: 6.1.13-200.fc37.x86_64 (x86_64), Desktop: GNOME Shell 43.3, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 22.3.5, Compiler: GCC 12.2.1 20221121, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Y-Cruncher is a multi-threaded Pi benchmark capable of computing Pi to trillions of digits. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 2347G2U (G1ETC2WW 2.82 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 12GB, Disk: 240GB ADATA SU635, Graphics: Intel HD 4000 IVB GT2 2GB, Audio: Realtek ALC3202, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Fedora Linux 37, Kernel: 6.1.12-200.fc37.x86_64 (x86_64), Desktop: GNOME Shell 43.3, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 22.3.5, Compiler: GCC 12.2.1 20221121, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 24 February 2023 14:16 by user t430.
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-build-config=bootstrap-lto --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 26 February 2023 12:04 by user noah.
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 2347G2U (G1ETC2WW 2.82 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 12GB, Disk: 240GB ADATA SU635, Graphics: Intel HD 4000 IVB GT2 2GB, Audio: Realtek ALC3202, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Fedora Linux 37, Kernel: 6.1.13-200.fc37.x86_64 (x86_64), Desktop: GNOME Shell 43.3, Display Server: X Server + Wayland, OpenGL: 4.2 Mesa 22.3.5, Compiler: GCC 12.2.1 20221121, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.5.0
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 26 February 2023 13:22 by user noah.