Intel Core i5-4670S testing with a LENOVO SHARKBAY (FBKTDFAUS BIOS) and Intel ARUBA on SystemRescue 10.01 via the Phoronix Test Suite.
Processor: Intel Core i5-4670S @ 3.80GHz (4 Cores), Motherboard: LENOVO SHARKBAY (FBKTDFAUS BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4 GB DDR3-1600MT/s RMR5030MN68F9F1600, Disk: 128GB TOSHIBA THNSNJ12 + 62GB USB Flash Disk, Graphics: Intel ARUBA (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x1d
Java Notes: OpenJDK Runtime Environment (build 20.0.1+9)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-4670S @ 3.80GHz (4 Cores), Motherboard: LENOVO SHARKBAY (FBKTDFAUS BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 2 x 4 GB DDR3-1600MT/s RMR5030MN68F9F1600, Disk: 128GB TOSHIBA THNSNJ12 + 62GB USB Flash Disk, Graphics: Intel ARUBA (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x1d
Java Notes: OpenJDK Runtime Environment (build 20.0.1+9)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 19 December 2023 17:11 by user root.