Intel Pentium M 1.73GHz testing with a Dell 0H8384 (A05 BIOS) and i915 256MB on Arch rolling via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x20
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Pentium M @ 1.73GHz (1 Core), Motherboard: Dell 0H8384 (A05 BIOS), Chipset: Intel Mobile 915GM/PM/GMS/910GML + ICH6M, Memory: 2048MB, Disk: 512GB DOGFISH SSD 512G, Graphics: i915 256MB, Audio: Intel 82801FB/FBM/FR/FW/FRW, Network: Broadcom NetXtreme BCM5751 PCI + Intel PRO/Wireless
OS: Arch rolling, Kernel: 6.1.12-zen1-1.0-zen-zen (i686), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 2.1 Mesa 23.2.0-devel (git-dabc52899b), Compiler: GCC 12.2.1 20230111 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1024x768
OS: Arch rolling, Kernel: 6.1.12-zen1-1.0-zen-zen (i686), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 3.3 Mesa 23.2.0-devel (git-dabc52899b), Compiler: GCC 12.2.1 20230111 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MESA_GLSL_VERSION_OVERRITE=330 MESA_GL_VERSION_OVERRIDE=3.3FC MESA_GLSL_VERSION_OVERRIDE=330FC MESA_GLES_VERSION_OVERRIDE=3.2 NVM_CD_FLAGS=
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x20
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test calculates the average frame-rate within the Tropics / Islands demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Resolution: 1024 x 768 - Mode: Windowed
Intel Mobile 915GM/GMS/910GML Express Graphics: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Unigine fatal error
Intel Mobile 915GM/GMS/910GML Express Graphics 3.3FC: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Unigine fatal error
Intel Mobile 915GM/GMS/910GML Express Graphics 3.3FC Try 2: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result. E: Unigine fatal error
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x20
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2023 00:11 by user eirikr1848.
Processor: Intel Pentium M @ 1.73GHz (1 Core), Motherboard: Dell 0H8384 (A05 BIOS), Chipset: Intel Mobile 915GM/PM/GMS/910GML + ICH6M, Memory: 2048MB, Disk: 512GB DOGFISH SSD 512G, Graphics: i915 256MB, Audio: Intel 82801FB/FBM/FR/FW/FRW, Network: Broadcom NetXtreme BCM5751 PCI + Intel PRO/Wireless
OS: Arch rolling, Kernel: 6.1.12-zen1-1.0-zen-zen (i686), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 2.1 Mesa 23.2.0-devel (git-dabc52899b), Compiler: GCC 12.2.1 20230111 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x20
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2023 04:21 by user eirikr1848.
Processor: Intel Pentium M @ 1.73GHz (1 Core), Motherboard: Dell 0H8384 (A05 BIOS), Chipset: Intel Mobile 915GM/PM/GMS/910GML + ICH6M, Memory: 2048MB, Disk: 512GB DOGFISH SSD 512G, Graphics: i915 256MB, Audio: Intel 82801FB/FBM/FR/FW/FRW, Network: Broadcom NetXtreme BCM5751 PCI + Intel PRO/Wireless
OS: Arch rolling, Kernel: 6.1.12-zen1-1.0-zen-zen (i686), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.7, OpenGL: 3.3 Mesa 23.2.0-devel (git-dabc52899b), Compiler: GCC 12.2.1 20230111 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MESA_GLSL_VERSION_OVERRITE=330 MESA_GL_VERSION_OVERRIDE=3.3FC MESA_GLSL_VERSION_OVERRIDE=330FC MESA_GLES_VERSION_OVERRIDE=3.2 NVM_CD_FLAGS=
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x20
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Vulnerable + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2023 07:13 by user eirikr1848.