MX
Debian nvidia working?
mx linux optimus not working
Processor: Intel Core i7-4702MQ @ 3.20GHz (4 Cores / 8 Threads), Motherboard: Acer VA70_HW (V1.15 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Western Digital WD10JPVX-22J + 256GB ADATA SX900 + 31GB USB Flash Drive, Graphics: Intel Haswell Mobile 2GB (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Broadcom NetLink BCM57780 PCIe + Qualcomm Atheros AR9462
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.4, OpenGL: 4.5 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Debian
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x17
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Debian nVidia
Processor: Intel Core i7-4702MQ @ 3.20GHz (4 Cores / 8 Threads), Motherboard: Acer VA70_HW (V1.15 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Western Digital WD10JPVX-22J + 256GB ADATA SX900, Graphics: Intel 4th Gen Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Broadcom NetLink BCM57780 PCIe + Qualcomm Atheros AR9462
OS: Debian 10, Kernel: 4.19.0-16-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server + Wayland, Compiler: GCC 8.3.0 + Open64 PARSE ERROR: Argument:-dumpversion Couldn t find match for argumentBrief USAGE: opencc [--noflush ] [-i ] [-o ] [-c ] [--] [--version] [-h]For complete USAGE and HELP type: opencc--help, File-System: ext4, Screen Resolution: 1920x1080
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
mx linux optimus not working
Processor: Intel Core i7-4702MQ @ 3.20GHz (4 Cores / 8 Threads), Motherboard: Acer VA70_HW (V1.15 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Western Digital WD10JPVX-22J + 256GB ADATA SX900 + 31GB USB Flash Drive, Graphics: Intel Haswell Mobile 2GB (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Broadcom NetLink BCM57780 PCIe + Qualcomm Atheros AR9462
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Desktop: Xfce 4.14, Display Server: X Server 1.20.4, OpenGL: 4.5 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x28
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 24 April 2021 02:23 by user cubiss.
Debian
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x17
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 April 2021 22:20 by user cubiss.
Debian nVidia
Processor: Intel Core i7-4702MQ @ 3.20GHz (4 Cores / 8 Threads), Motherboard: Acer VA70_HW (V1.15 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 16GB, Disk: 1000GB Western Digital WD10JPVX-22J + 256GB ADATA SX900, Graphics: Intel 4th Gen Core IGP (1150MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Broadcom NetLink BCM57780 PCIe + Qualcomm Atheros AR9462
OS: Debian 10, Kernel: 4.19.0-16-amd64 (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server + Wayland, Compiler: GCC 8.3.0 + Open64 PARSE ERROR: Argument:-dumpversion Couldn t find match for argumentBrief USAGE: opencc [--noflush ] [-i ] [-o ] [-c ] [--] [--version] [-h]For complete USAGE and HELP type: opencc--help, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x17
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 27 April 2021 22:57 by user cubiss.