myetqwdemo
Intel Core i5-3320M testing with a LENOVO 23259S9 (G2ET82WW 2.02 BIOS) and Intel Ivybridge Mobile 2GB on Debian 10 via the Phoronix Test Suite.
myetqwdemo_20120108
Processor: AMD Athlon II X4 620 @ 2.60GHz (4 Cores), Motherboard: Gigabyte GA-MA785GMT-UD2H, Chipset: AMD RS880 + SB700/SB800, Memory: 3584MB, Disk: 160GB MAXTOR STM316081 + 500GB Western Digital WD5000AADS-0 + 500GB Western Digital WD5000AAKS-0, Graphics: NVIDIA GeForce GTX 550 Ti 1024MB (970/2100MHz), Audio: NVIDIA Device 0bee, Network: Realtek RTL8111/8168B
OS: Debian 6.0.3, Kernel: 2.6.32-5-686 (i686), Desktop: GNOME 2.30.2, Display Server: X Server 1.7.7, Display Driver: NVIDIA 275.36, OpenGL: 4.1.0 NVIDIA 275.36, Compiler: GCC 4.4.5, File-System: ext2/ext3, Screen Resolution: 1680x1050
myetqwdemo_leno
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 23259S9 (G2ET82WW 2.02 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 16GB, Disk: 480GB SanDisk SSD PLUS, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Realtek ALC269VC, Monitor: DELL E2214H, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Debian 10, Kernel: 4.19.0-10-amd64 (x86_64), Desktop: KDE Plasma 5.14.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.2 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x13
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
ET: Quake Wars Demo
This test calculates the average frame-rate within the demo for the game Enemy Territory: Quake Wars demo game. Learn more via the OpenBenchmarking.org test page.
myetqwdemo_20120108
Processor: AMD Athlon II X4 620 @ 2.60GHz (4 Cores), Motherboard: Gigabyte GA-MA785GMT-UD2H, Chipset: AMD RS880 + SB700/SB800, Memory: 3584MB, Disk: 160GB MAXTOR STM316081 + 500GB Western Digital WD5000AADS-0 + 500GB Western Digital WD5000AAKS-0, Graphics: NVIDIA GeForce GTX 550 Ti 1024MB (970/2100MHz), Audio: NVIDIA Device 0bee, Network: Realtek RTL8111/8168B
OS: Debian 6.0.3, Kernel: 2.6.32-5-686 (i686), Desktop: GNOME 2.30.2, Display Server: X Server 1.7.7, Display Driver: NVIDIA 275.36, OpenGL: 4.1.0 NVIDIA 275.36, Compiler: GCC 4.4.5, File-System: ext2/ext3, Screen Resolution: 1680x1050
Testing initiated at 8 January 2012 17:15 by user marco.
myetqwdemo_leno
Processor: Intel Core i5-3320M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 23259S9 (G2ET82WW 2.02 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 16GB, Disk: 480GB SanDisk SSD PLUS, Graphics: Intel Ivybridge Mobile 2GB (1200MHz), Audio: Realtek ALC269VC, Monitor: DELL E2214H, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: Debian 10, Kernel: 4.19.0-10-amd64 (x86_64), Desktop: KDE Plasma 5.14.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.2 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x13
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 23 August 2020 12:12 by user marc.