res1
sadka
test2
Processor: Intel Pentium T4500 @ 2.30GHz (2 Cores), Motherboard: Acer JV50 (V2.10 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: NVIDIA NVA8 512MB, Audio: Realtek ALC888, Network: Broadcom NetLink BCM5784M PCIe + Qualcomm Atheros AR928X
OS: Linuxmint 20.3, Kernel: 5.4.0-104-generic (x86_64), Desktop: Cinnamon 5.2.7, Display Server: X Server 1.20.13, Display Driver: nouveau, OpenGL: 3.3 Mesa 21.2.6, Compiler: GCC 9.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1600x900
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
fast-cli
This test profile uses the open-source fast-cli client to benchmark your Internet connection's upload/download performance and latency against Netflix's fast.com service. Learn more via the OpenBenchmarking.org test page.
test2
Processor: Intel Pentium T4500 @ 2.30GHz (2 Cores), Motherboard: Acer JV50 (V2.10 BIOS), Chipset: Intel Mobile 4 MCH + ICH9M, Memory: 4096MB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: NVIDIA NVA8 512MB, Audio: Realtek ALC888, Network: Broadcom NetLink BCM5784M PCIe + Qualcomm Atheros AR928X
OS: Linuxmint 20.3, Kernel: 5.4.0-104-generic (x86_64), Desktop: Cinnamon 5.2.7, Display Server: X Server 1.20.13, Display Driver: nouveau, OpenGL: 3.3 Mesa 21.2.6, Compiler: GCC 9.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1600x900
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 March 2022 09:50 by user oli.