Intel Core i5 460M testing with a Acer Calpella (V1.24 BIOS) and AMD Mobility Radeon HD 5430/5450/5470 on Arch Linux via the Phoronix Test Suite.
Processor: Intel Core i5 460M @ 2.53GHz (2 Cores / 4 Threads), Motherboard: Acer Calpella (V1.24 BIOS), Chipset: Intel Core DRAM, Memory: 2 x 2GB DDR3-1067MT/s M471B5673FH0-CH9, Disk: 256GB Samsung SSD 850, Graphics: AMD Mobility Radeon HD 5430/5450/5470, Audio: Realtek ALC272X, Network: Broadcom NetLink BCM57780 PCIe + Broadcom BCM43225 802.11b/g/n
OS: Arch Linux, Kernel: 6.9.3-zen1-1-zen (x86_64), Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.1.0-arch1.1 (LLVM 17.0.6), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a test of Yamagi Quake II. Yamagi Quake II is an enhanced client for id Software's Quake II with focus on offline and coop gameplay. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5 460M @ 2.53GHz (2 Cores / 4 Threads), Motherboard: Acer Calpella (V1.24 BIOS), Chipset: Intel Core DRAM, Memory: 2 x 2GB DDR3-1067MT/s M471B5673FH0-CH9, Disk: 256GB Samsung SSD 850, Graphics: AMD Mobility Radeon HD 5430/5450/5470, Audio: Realtek ALC272X, Network: Broadcom NetLink BCM57780 PCIe + Broadcom BCM43225 802.11b/g/n
OS: Arch Linux, Kernel: 6.9.3-zen1-1-zen (x86_64), Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 24.1.0-arch1.1 (LLVM 17.0.6), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 June 2024 20:15 by user jp.