Intel Xeon E3-1225 V2 testing with a Gigabyte H61M-DS2 (F7 BIOS) and llvmpipe on Kylin v10 via the Phoronix Test Suite.
Processor: Intel Xeon E3-1245 v5 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Colorful And Development C.B250M-D (5.12 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500 + B250, Memory: 16GB, Disk: 512GB Western Digital WD PC SN810 SDCPNRY-512G-1006, Graphics: llvmpipe (1150MHz), Audio: Realtek ALC662 rev3, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 22.04, Kernel: 6.2.0-37-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, OpenGL: 4.5 Mesa 23.0.4-0ubuntu1~22.04.1 (LLVM 15.0.7 256 bits), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1536x864
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Processor: Intel Xeon E3-1225 V2 @ 3.60GHz (4 Cores), Motherboard: Gigabyte H61M-DS2 (F7 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 16GB, Disk: 256GB HYS256, Graphics: llvmpipe (1250MHz), Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Kylin v10, Kernel: 5.10.0-8-generic (x86_64), Display Server: X Server 1.20.9, OpenGL: 4.5 Mesa 20.2.6 (LLVM 11.0.0 256 bits), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1536x864
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
GIMP is an open-source image manipulaton program. This test profile will use the system-provided GIMP program otherwise on Windows relys upon a pre-packaged Windows binary from upstream GIMP.org. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E3-1245 v5 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Colorful And Development C.B250M-D (5.12 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500 + B250, Memory: 16GB, Disk: 512GB Western Digital WD PC SN810 SDCPNRY-512G-1006, Graphics: llvmpipe (1150MHz), Audio: Realtek ALC662 rev3, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 22.04, Kernel: 6.2.0-37-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, OpenGL: 4.5 Mesa 23.0.4-0ubuntu1~22.04.1 (LLVM 15.0.7 256 bits), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1536x864
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 16 December 2023 06:46 by user liupe.
Processor: Intel Xeon E3-1225 V2 @ 3.60GHz (4 Cores), Motherboard: Gigabyte H61M-DS2 (F7 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 16GB, Disk: 256GB HYS256, Graphics: llvmpipe (1250MHz), Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Kylin v10, Kernel: 5.10.0-8-generic (x86_64), Display Server: X Server 1.20.9, OpenGL: 4.5 Mesa 20.2.6 (LLVM 11.0.0 256 bits), Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1536x864
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 17 December 2023 06:12 by user liupe.