I’m using a laptop with Intel Core i3 5005U 2.00GHz, but frequency only goes to 1.90GHz, already tried boot with “processor.ignore_ppc=1”, no changes.
Tried force set frequency but with no sucess.
I remember cpu going to 2.00GHz on Windows, is this a normal thing with linux or is there some hope for me?
cpupower frequency-info
analisando o CPU 0: driver: intel_cpufreq CPUs que rodam na mesma frequência de hardware: 0 CPUs que precisam ter suas frequências coordenadas por software: 0 maior latência de transição: 20.0 us limites do hardware: 500 MHz - 1.90 GHz reguladores do cpufreq disponíveis: conservative ondemand userspace powersave performance schedutil política de frequência atual deve estar entre 500 MHz e 1.90 GHz. O regulador "ondemand" deve decidir qual velocidade usar dentro desse limite. current CPU frequency: Unable to call hardware current CPU frequency: 883 MHz (asserted by call to kernel) boost state support: Supported: no Active: no
lscpu
Arquitetura: x86_64 Modo(s) operacional da CPU: 32-bit, 64-bit Ordem dos bytes: Little Endian Tamanhos de endereço: 39 bits physical, 48 bits virtual CPU(s): 4 Lista de CPU(s) on-line: 0-3 Thread(s) per núcleo: 2 Núcleo(s) por soquete: 2 Soquete(s): 1 Nó(s) de NUMA: 1 ID de fornecedor: GenuineIntel Família da CPU: 6 Modelo: 61 Nome do modelo: Intel(R) Core(TM) i3-5005U CPU @ 2.00GHz Step: 4 CPU MHz: 500.000 CPU MHz máx.: 1900,0000 CPU MHz mín.: 500,0000 BogoMIPS: 3991.02 Virtualização: VT-x cache de L1d: 64 KiB cache de L1i: 64 KiB cache de L2: 512 KiB cache de L3: 3 MiB CPU(s) de nó0 NUMA: 0-3 Vulnerability Itlb multihit: KVM: Mitigation: VMX disabled Vulnerability L1tf: Mitigation; PTE Inversion; VMX conditional cach e flushes, SMT vulnerable Vulnerability Mds: Mitigation; Clear CPU buffers; SMT vulnerable Vulnerability Meltdown: Mitigation; PTI Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled v ia prctl and seccomp Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Vulnerability Spectre v2: Mitigation; Full generic retpoline, IBPB condit ional, IBRS_FW, STIBP conditional, RSB filling Vulnerability Srbds: Mitigation; Microcode Vulnerability Tsx async abort: Not affected Opções: fpu vme de pse tsc msr pae mce cx8 apic sep mtr r pge mca cmov pat pse36 clflush dts acpi mmx f xsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rd tscp lm constant_tsc arch_perfmon pebs bts rep_ good nopl xtopology nonstop_tsc cpuid aperfmper f pni pclmulqdq dtes64 monitor ds_cpl vmx est t m2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 ss e4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetc h cpuid_fault epb invpcid_single pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpi d ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi 2 erms invpcid rdseed adx smap intel_pt xsaveop t dtherm arat pln pts md_clear flush_l1d