secureboot enabled nvidia r535
Processor: Intel Core i7-4710HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS N751JK v1.0 (N751JK.207 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS NVIDIA GeForce GTX 850M 2GB, Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9462
OS: Ubuntu 20.04, Kernel: 5.15.0-48-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.13, Display Driver: NVIDIA 515.65.01, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
OS: Ubuntu 20.04, Kernel: 5.15.0-79-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.13, Display Driver: NVIDIA 525.125.06, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Processor: Intel Core i7-4710HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS N751JK v1.0 (N751JK.207 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 1 x 8192 MB DDR3-1600MT/s, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS NVIDIA GeForce GTX 850M 2GB, Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9462
OS: Ubuntu 20.04, Kernel: 5.15.0-88-generic (x86_64), Display Server: X Server 1.20.13, Display Driver: NVIDIA 535.113.01, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 3840x1080
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Tesseract is a fork of Cube 2 Sauerbraten with numerous graphics and game-play improvements. Tesseract has been in development since 2012 while its first release happened in May of 2014. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-4710HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS N751JK v1.0 (N751JK.207 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS NVIDIA GeForce GTX 850M 2GB, Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9462
OS: Ubuntu 20.04, Kernel: 5.15.0-48-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.13, Display Driver: NVIDIA 515.65.01, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 12 September 2022 10:20 by user axion.
Processor: Intel Core i7-4710HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS N751JK v1.0 (N751JK.207 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS NVIDIA GeForce GTX 850M 2GB, Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9462
OS: Ubuntu 20.04, Kernel: 5.15.0-79-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.13, Display Driver: NVIDIA 525.125.06, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 31 July 2023 21:39 by user axion.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 19 October 2023 05:03 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 19 October 2023 07:14 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 19 October 2023 09:56 by user root.
Processor: Intel Core i7-4710HQ @ 3.50GHz (4 Cores / 8 Threads), Motherboard: ASUS N751JK v1.0 (N751JK.207 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 1 x 8192 MB DDR3-1600MT/s, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS NVIDIA GeForce GTX 850M 2GB, Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros AR9462
OS: Ubuntu 20.04, Kernel: 5.15.0-88-generic (x86_64), Display Server: X Server 1.20.13, Display Driver: NVIDIA 535.113.01, OpenGL: 4.6.0, Vulkan: 1.2.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x28 - Thermald 1.9.1
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 82.07.47.00.06
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 19 October 2023 13:23 by user root.