pentium-m_intel852gm
Intel Pentium M 1.60GHz testing with a TOSHIBA Portable PC (Version 1.40 BIOS) and Intel 852GM/855GM 128MB on Debian 10 via the Phoronix Test Suite.
Intel 852GM
Processor: Intel Pentium M @ 1.60GHz (1 Core), Motherboard: TOSHIBA Portable PC (Version 1.40 BIOS), Chipset: Intel 82852/82855 + ICH4-M, Memory: 2 x 256 MB SDRAM, Disk: 60GB IC25N060ATMR04-0, Graphics: Intel 852GM/855GM 128MB, Audio: Intel 82801DB/DBL/DBM, Network: Intel 82801DB PRO/100 + Intel PRO/Wireless
OS: Debian 10, Kernel: 4.9.0-294-antix.1-486-smp (i686), Desktop: IceWM, Display Server: X Server 1.20.4, OpenGL: 1.3 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x18
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Intel 852GM
Processor: Intel Pentium M @ 1.60GHz (1 Core), Motherboard: TOSHIBA Portable PC (Version 1.40 BIOS), Chipset: Intel 82852/82855 + ICH4-M, Memory: 2 x 256 MB SDRAM, Disk: 60GB IC25N060ATMR04-0, Graphics: Intel 852GM/855GM 128MB, Audio: Intel 82801DB/DBL/DBM, Network: Intel 82801DB PRO/100 + Intel PRO/Wireless
OS: Debian 10, Kernel: 4.9.0-294-antix.1-486-smp (i686), Desktop: IceWM, Display Server: X Server 1.20.4, OpenGL: 1.3 Mesa 18.3.6, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x18
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 August 2022 17:24 by user root.