Intel Core i5-3570K testing with a ASUS P8Z77-V DELUXE (2104 BIOS) and AMD Radeon RX 5700 XT 8GB on Pop 22.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 111
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-3570K @ 4.20GHz (4 Cores), Motherboard: ASUS P8Z77-V DELUXE (2104 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 2000GB CT2000MX500SSD1 + 500GB Samsung SSD 850 + 4001GB Seagate ST4000DM005-2DP1 + 256GB Samsung SSD 840, Graphics: AMD Radeon RX 5700 XT 8GB (2100/875MHz), Audio: Realtek ALC898, Monitor: LG HDR WQHD + W2443, Network: Intel 82579V + Realtek RTL8111/8168/8411
OS: Pop 22.04, Kernel: 6.5.6-76060506-generic (x86_64), Desktop: GNOME Shell 42.5, Display Server: X Server 1.20.13, OpenGL: 4.6 Mesa 23.1.3-1pop0~1689084530~22.04~0618746 (LLVM 15.0.7 DRM 3.54), Vulkan: 1.3.246, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 5360x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Superposition demo for the Unigine engine, released in 2017. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 111
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 10 November 2023 18:58 by user rylljan.
Processor: Intel Core i5-3570K @ 4.20GHz (4 Cores), Motherboard: ASUS P8Z77-V DELUXE (2104 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 2000GB CT2000MX500SSD1 + 500GB Samsung SSD 850 + 4001GB Seagate ST4000DM005-2DP1 + 256GB Samsung SSD 840, Graphics: AMD Radeon RX 5700 XT 8GB (2100/875MHz), Audio: Realtek ALC898, Monitor: LG HDR WQHD + W2443, Network: Intel 82579V + Realtek RTL8111/8168/8411
OS: Pop 22.04, Kernel: 6.5.6-76060506-generic (x86_64), Desktop: GNOME Shell 42.5, Display Server: X Server 1.20.13, OpenGL: 4.6 Mesa 23.1.3-1pop0~1689084530~22.04~0618746 (LLVM 15.0.7 DRM 3.54), Vulkan: 1.3.246, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 5360x1440
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21 - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 10 November 2023 19:36 by user rylljan.