phoronix-20210521.log
AMD Athlon 64 X2 5000+ testing with a Dell 0RY206 (1.0.13 BIOS) and MSI NVIDIA GeForce 210 1GB on Ubuntu 20.04 via the Phoronix Test Suite.
openarena20210521
Processor: AMD Athlon 64 X2 5000+ @ 2.60GHz (2 Cores), Motherboard: Dell 0RY206 (1.0.13 BIOS), Chipset: NVIDIA MCP61, Memory: 4096MB, Disk: 320GB SAMSUNG HD321KJ + 1000GB SAMSUNG HD103UJ + Netac SSD 128GB, Graphics: MSI NVIDIA GeForce 210 1GB, Audio: Realtek ALC888, Monitor: Idek Iiyama PL2492H
OS: Ubuntu 20.04, Kernel: 5.8.0-53-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 340.108, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: powernow-k8 ondemand - CPU Microcode: 0x83
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
openarena20210521
Processor: AMD Athlon 64 X2 5000+ @ 2.60GHz (2 Cores), Motherboard: Dell 0RY206 (1.0.13 BIOS), Chipset: NVIDIA MCP61, Memory: 4096MB, Disk: 320GB SAMSUNG HD321KJ + 1000GB SAMSUNG HD103UJ + Netac SSD 128GB, Graphics: MSI NVIDIA GeForce 210 1GB, Audio: Realtek ALC888, Monitor: Idek Iiyama PL2492H
OS: Ubuntu 20.04, Kernel: 5.8.0-53-generic (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Display Driver: NVIDIA 340.108, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: powernow-k8 ondemand - CPU Microcode: 0x83
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 May 2021 14:07 by user andrew.