Intel Celeron N5095 testing with a GEEKOM MiniAir 11 (2.07 BIOS) and Intel JasperLake [UHD ] on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel N95 @ 3.40GHz (4 Cores), Motherboard: (5.27 BIOS), Chipset: Intel Device 54ef, Memory: 8GB, Disk: 256GB NS256GSSD340, Graphics: i915drmfb (1200MHz), Audio: Intel Device 54c8, Monitor: EK240Y, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 22.04, Kernel: 5.19.0-50-generic (x86_64), OpenCL: OpenCL 3.0, Vulkan: 1.3.246, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x11 - Thermald 2.4.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HUAWEI NBLK-WAX9X-PCB (1.18 BIOS), Chipset: AMD Raven/Raven2, Memory: 8GB, Disk: 256GB SPCC M.2 PCIe SSD, Graphics: AMD Radeon Vega / Mobile (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8822CE 802.11ac PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-2670QM @ 3.10GHz (4 Cores / 8 Threads), Motherboard: LENOVO 4284WWW (8BET66WW 1.46 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 20GB, Disk: 960GB INTEL SSDSC2KG960G7R + 256GB SAMSUNG MZMTE256, Graphics: Intel 2nd Generation Core IGP, Audio: Conexant CX20590, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-6500U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: LENOVO Toronto 5A2 (0XCN43WW BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 12GB, Disk: 960GB INTEL SSDSC2KG960G7R, Graphics: Intel Skylake GT2 [HD 520] (1050MHz), Audio: Conexant CX20751/2, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-3537U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS K56CM v1.0 (K56CM.209 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 960GB INTEL SSDSC2KG960G7R, Graphics: ASUS Intel 3rd Gen Core (1200MHz), Audio: Realtek ALC270, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21 - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: ARMv8 Cortex-A72 @ 1.50GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.1, Chipset: Broadcom BCM2711, Memory: 4096MB, Disk: 63GB SD64G
OS: Ubuntu 22.04, Kernel: 5.15.0-1034-raspi (aarch64), Compiler: GCC 11.4.0, File-System: ext4
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: cpufreq-dt performance
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Celeron N5095 @ 2.90GHz (4 Cores), Motherboard: GEEKOM MiniAir 11 (2.07 BIOS), Chipset: Intel Device 4def, Memory: 8GB, Disk: Lexar 512GB SSD, Graphics: Intel JasperLake [UHD ] (750MHz), Audio: Realtek ALC269VB, Monitor: EK240Y, Network: Realtek RTL8111/8168/8411 + Intel 3165
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x24000024 - Thermald 2.4.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
GEGL is the Generic Graphics Library and is the library/framework used by GIMP and other applications like GNOME Photos. This test profile times how long it takes to complete various GEGL operations on a static set of sample JPEG images. Learn more via the OpenBenchmarking.org test page.
RSVG/librsvg is an SVG vector graphics library. This test profile times how long it takes to complete various operations by rsvg-convert. Learn more via the OpenBenchmarking.org test page.
Various benchmarking operations with the LibreOffice open-source office suite. Learn more via the OpenBenchmarking.org test page.
Inkscape is an open-source vector graphics editor. This test profile times how long it takes to complete various operations by Inkscape. Learn more via the OpenBenchmarking.org test page.
GIMP is an open-source image manipulaton program. This test profile will use the system-provided GIMP program otherwise on Windows relys upon a pre-packaged Windows binary from upstream GIMP.org. Learn more via the OpenBenchmarking.org test page.
GEGL is the Generic Graphics Library and is the library/framework used by GIMP and other applications like GNOME Photos. This test profile times how long it takes to complete various GEGL operations on a static set of sample JPEG images. Learn more via the OpenBenchmarking.org test page.
GIMP is an open-source image manipulaton program. This test profile will use the system-provided GIMP program otherwise on Windows relys upon a pre-packaged Windows binary from upstream GIMP.org. Learn more via the OpenBenchmarking.org test page.
This test profile measures how long it takes to complete several reference GNU Octave files via octave-benchmark. GNU Octave is used for numerical computations and is an open-source alternative to MATLAB. Learn more via the OpenBenchmarking.org test page.
GEGL is the Generic Graphics Library and is the library/framework used by GIMP and other applications like GNOME Photos. This test profile times how long it takes to complete various GEGL operations on a static set of sample JPEG images. Learn more via the OpenBenchmarking.org test page.
Processor: Intel N95 @ 3.40GHz (4 Cores), Motherboard: (5.27 BIOS), Chipset: Intel Device 54ef, Memory: 8GB, Disk: 256GB NS256GSSD340, Graphics: i915drmfb (1200MHz), Audio: Intel Device 54c8, Monitor: EK240Y, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 22.04, Kernel: 5.19.0-50-generic (x86_64), OpenCL: OpenCL 3.0, Vulkan: 1.3.246, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x11 - Thermald 2.4.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 13:09 by user nipogi.
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HUAWEI NBLK-WAX9X-PCB (1.18 BIOS), Chipset: AMD Raven/Raven2, Memory: 8GB, Disk: 256GB SPCC M.2 PCIe SSD, Graphics: AMD Radeon Vega / Mobile (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8822CE 802.11ac PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 13:57 by user minerale.
Processor: Intel Core i7-2670QM @ 3.10GHz (4 Cores / 8 Threads), Motherboard: LENOVO 4284WWW (8BET66WW 1.46 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 20GB, Disk: 960GB INTEL SSDSC2KG960G7R + 256GB SAMSUNG MZMTE256, Graphics: Intel 2nd Generation Core IGP, Audio: Conexant CX20590, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 14:38 by user ale.
Processor: Intel Core i7-6500U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: LENOVO Toronto 5A2 (0XCN43WW BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 12GB, Disk: 960GB INTEL SSDSC2KG960G7R, Graphics: Intel Skylake GT2 [HD 520] (1050MHz), Audio: Conexant CX20751/2, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 19:38 by user ale.
Processor: Intel Core i7-3537U @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS K56CM v1.0 (K56CM.209 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 960GB INTEL SSDSC2KG960G7R, Graphics: ASUS Intel 3rd Gen Core (1200MHz), Audio: Realtek ALC270, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9485
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x21 - Thermald 2.4.9
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 20:31 by user ale.
Processor: ARMv8 Cortex-A72 @ 1.50GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.1, Chipset: Broadcom BCM2711, Memory: 4096MB, Disk: 63GB SD64G
OS: Ubuntu 22.04, Kernel: 5.15.0-1034-raspi (aarch64), Compiler: GCC 11.4.0, File-System: ext4
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: cpufreq-dt performance
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2023 21:32 by user ubuntu.
Processor: Intel Celeron N5095 @ 2.90GHz (4 Cores), Motherboard: GEEKOM MiniAir 11 (2.07 BIOS), Chipset: Intel Device 4def, Memory: 8GB, Disk: Lexar 512GB SSD, Graphics: Intel JasperLake [UHD ] (750MHz), Audio: Realtek ALC269VB, Monitor: EK240Y, Network: Realtek RTL8111/8168/8411 + Intel 3165
OS: Ubuntu 22.04, Kernel: 5.15.0-79-generic (x86_64), Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x24000024 - Thermald 2.4.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 23 August 2023 00:51 by user ale.