Intel Core i5-3470 testing with a ASRock Z77 Extreme4-M (P1.50 BIOS) and Gigabyte AMD Radeon R9 285/380 on Devuan 5 via the Phoronix Test Suite.
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Motherboard: ASRock Z77 Extreme4-M (P1.50 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 120GB CT120BX500SSD1, Graphics: Gigabyte AMD Radeon R9 285/380 (1100MHz), Audio: Realtek ALC898, Network: Realtek RTL8111/8168/8411
OS: Devuan 5, Kernel: 6.1.0-28-amd64 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 4.6 Mesa 22.3.6 (LLVM 15.0.6 DRM 3.49), Compiler: GCC 12.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Graphics Notes: GLAMOR
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-3470 @ 3.60GHz (4 Cores), Motherboard: ASRock Z77 Extreme4-M (P1.50 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 32GB, Disk: 120GB CT120BX500SSD1, Graphics: Gigabyte AMD Radeon R9 285/380 (1100MHz), Audio: Realtek ALC898, Network: Realtek RTL8111/8168/8411
OS: Devuan 5, Kernel: 6.1.0-28-amd64 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 4.6 Mesa 22.3.6 (LLVM 15.0.6 DRM 3.49), Compiler: GCC 12.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Graphics Notes: GLAMOR
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 6 December 2024 18:06 by user first.