test1
a test
test1
Processor: Intel Core 2 Duo E7200 @ 2.53GHz (2 Cores), Motherboard: ASUS P5B-VM SE (0804 BIOS), Chipset: Intel 82P965/G965 + ICH8/R, Memory: 3072MB, Disk: 320GB Seagate ST9320421AS, Graphics: ASUS NVIDIA NV50 384MB, Audio: Realtek ALC883, Network: Qualcomm Atheros Attansic L1
OS: Ubuntu 16.04, Kernel: 4.15.0-107-generic (x86_64), Desktop: MATE 1.12.1, Display Server: X Server 1.19.6, Display Driver: nouveau, OpenGL: 3.3 Mesa 18.0.5, Vulkan: 1.0.61, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60f
Graphics Notes: EXA
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
GLmark2
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
test1
Processor: Intel Core 2 Duo E7200 @ 2.53GHz (2 Cores), Motherboard: ASUS P5B-VM SE (0804 BIOS), Chipset: Intel 82P965/G965 + ICH8/R, Memory: 3072MB, Disk: 320GB Seagate ST9320421AS, Graphics: ASUS NVIDIA NV50 384MB, Audio: Realtek ALC883, Network: Qualcomm Atheros Attansic L1
OS: Ubuntu 16.04, Kernel: 4.15.0-107-generic (x86_64), Desktop: MATE 1.12.1, Display Server: X Server 1.19.6, Display Driver: nouveau, OpenGL: 3.3 Mesa 18.0.5, Vulkan: 1.0.61, Compiler: GCC 5.4.0 20160609, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x60f
Graphics Notes: EXA
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 May 2021 13:06 by user robot.