Intel Core i3-2310M

The Intel Core i3-2310M is a 4 thread processor configuration with 2.1GHz clock speed. The Intel Core i3-2310M is a "Sandy Bridge" processor. Some of the prominent capabilities of the processor include SSE 4.2 + AVX + Intel VT-x. This processor has been found on OpenBenchmarking.org since Q3'2011 and found in approximately 1,694 results on OpenBenchmarking.org.

Compare The Intel Core i3-2310M Against Other CPUs.

Below is a generalized look at the performance across various test profiles and where relevant the different test profile options exposed for a high-level look at the performance compared to all available public test results on OpenBenchmarking.org.


To find individual public OpenBenchmarking.org results matching this component, use the integrated Google site search page.


processor	: 0
vendor_id	: GenuineIntel
cpu family	: 6
model		: 42
model name	: Intel(R) Core(TM) i3-2310M CPU @ 2.10GHz
stepping	: 7
microcode	: 0x2f
cpu MHz		: 993.024
cache size	: 3072 KB
physical id	: 0
siblings	: 4
core id		: 0
cpu cores	: 2
apicid		: 0
initial apicid	: 0
fpu		: yes
fpu_exception	: yes
cpuid level	: 13
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer xsave avx lahf_lm epb pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid xsaveopt dtherm arat pln pts md_clear flush_l1d
bugs		: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds swapgs itlb_multihit
bogomips	: 4186.65
clflush size	: 64
cache_alignment	: 64
address sizes	: 36 bits physical, 48 bits virtual
power management:
Arquitectura:                        x86_64
modo(s) de operación de las CPUs:    32-bit, 64-bit
Tamaños de las direcciones:          36 bits physical, 48 bits virtual
Orden de los bytes:                  Little Endian
CPU(s):                              4
Lista de la(s) CPU(s) en línea:      0-3
ID de fabricante:                    GenuineIntel
Nombre del modelo:                   Intel(R) Core(TM) i3-2310M CPU @ 2.10GHz
Familia de CPU:                      6
Modelo:                              42
Hilo(s) de procesamiento por núcleo: 2
Núcleo(s) por «socket»:              2
«Socket(s)»:                         1
Revisión:                            7
CPU(s) scaling MHz:                  38%
CPU MHz máx.:                        2100.0000
CPU MHz mín.:                        800.0000
BogoMIPS:                            4190.46
Indicadores:                         fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic popcnt tsc_deadline_timer xsave avx lahf_lm epb pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid xsaveopt dtherm arat pln pts md_clear flush_l1d
Virtualización:                      VT-x
Caché L1d:                           64 KiB (2 instancias)
Caché L1i:                           64 KiB (2 instancias)
Caché L2:                            512 KiB (2 instancias)
Caché L3:                            3 MiB (1 instancia)
Modo(s) NUMA:                        1
CPU(s) del nodo NUMA 0:              0-3
Vulnerabilidad Itlb multihit:        KVM: Mitigation: VMX disabled
Vulnerabilidad L1tf:                 Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerabilidad Mds:                  Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerabilidad Meltdown:             Mitigation; PTI
Vulnerabilidad Mmio stale data:      Unknown: No mitigations
Vulnerabilidad Retbleed:             Not affected
Vulnerabilidad Spec store bypass:    Mitigation; Speculative Store Bypass disabled via prctl
Vulnerabilidad Spectre v1:           Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerabilidad Spectre v2:           Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling, PBRSB-eIBRS Not affected
Vulnerabilidad Srbds:                Not affected
Vulnerabilidad Tsx async abort:      Not affected