myurbanterror-bigscreen
Intel Core 2 Duo T5550 testing with a Acer Poyang (V1.27 BIOS) and NVIDIA NV84 512MB on Debian 11 via the Phoronix Test Suite.
myurbanterror-bigscreen-20220814-0
Processor: Intel Core 2 Duo T5550 @ 1.83GHz (2 Cores), Motherboard: Acer Poyang (V1.27 BIOS), Chipset: Intel Mobile PM965/GM965/GL960 + ICH8M, Memory: 3072MB, Disk: 320GB Western Digital WD3200BEVT-2, Graphics: NVIDIA GeForce 8600M GT, Audio: Realtek ALC268, Network: Broadcom NetLink BCM5787M PCI + Intel PRO/Wireless
OS: Debian 11, Kernel: 5.10.0-16-amd64 (x86_64), Desktop: KDE Plasma 5.20.5, Display Server: X Server 1.20.11, Display Driver: nouveau, OpenGL: 3.3 Mesa 20.3.5, Vulkan: 1.0.2, File-System: ext4, Screen Resolution: 1440x900
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0xa3
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
myurbanterror-bigscreen-20220814-1
Processor: Intel Core 2 Duo T5550 @ 1.83GHz (2 Cores), Motherboard: Acer Poyang (V1.27 BIOS), Chipset: Intel Mobile PM965/GM965/GL960 + ICH8M, Memory: 3072MB, Disk: 320GB Western Digital WD3200BEVT-2, Graphics: NVIDIA NV84 512MB, Audio: Realtek ALC268, Network: Broadcom NetLink BCM5787M PCI + Intel PRO/Wireless
OS: Debian 11, Kernel: 5.10.0-16-amd64 (x86_64), Desktop: KDE Plasma 5.20.5, Display Server: X Server 1.20.11, Display Driver: nouveau, OpenGL: 3.3 Mesa 20.3.5, Vulkan: 1.0.2, File-System: ext4, Screen Resolution: 800x600
Urban Terror
Urban Terror is an open-source game that uses the ioquake3 engine. Urban Terror is a tactical first-person shooter supported on all major operating systems. Learn more via the OpenBenchmarking.org test page.
myurbanterror-bigscreen-20220814-0
Processor: Intel Core 2 Duo T5550 @ 1.83GHz (2 Cores), Motherboard: Acer Poyang (V1.27 BIOS), Chipset: Intel Mobile PM965/GM965/GL960 + ICH8M, Memory: 3072MB, Disk: 320GB Western Digital WD3200BEVT-2, Graphics: NVIDIA GeForce 8600M GT, Audio: Realtek ALC268, Network: Broadcom NetLink BCM5787M PCI + Intel PRO/Wireless
OS: Debian 11, Kernel: 5.10.0-16-amd64 (x86_64), Desktop: KDE Plasma 5.20.5, Display Server: X Server 1.20.11, Display Driver: nouveau, OpenGL: 3.3 Mesa 20.3.5, Vulkan: 1.0.2, File-System: ext4, Screen Resolution: 1440x900
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0xa3
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 August 2022 13:31 by user marc.
myurbanterror-bigscreen-20220814-1
Processor: Intel Core 2 Duo T5550 @ 1.83GHz (2 Cores), Motherboard: Acer Poyang (V1.27 BIOS), Chipset: Intel Mobile PM965/GM965/GL960 + ICH8M, Memory: 3072MB, Disk: 320GB Western Digital WD3200BEVT-2, Graphics: NVIDIA NV84 512MB, Audio: Realtek ALC268, Network: Broadcom NetLink BCM5787M PCI + Intel PRO/Wireless
OS: Debian 11, Kernel: 5.10.0-16-amd64 (x86_64), Desktop: KDE Plasma 5.20.5, Display Server: X Server 1.20.11, Display Driver: nouveau, OpenGL: 3.3 Mesa 20.3.5, Vulkan: 1.0.2, File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0xa3
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 August 2022 14:26 by user marc.