glmark2.results
Intel Core i7-2600 testing with a Dell 0Y2MRG (A06 BIOS) and MSI NVIDIA GeForce GT 420 1GB on Ubuntu 18.04 via the Phoronix Test Suite.
vostro
Processor: Intel Core i7-2600 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Dell 0Y2MRG (A06 BIOS), Chipset: Intel 2nd Generation Core Family DRAM, Memory: 8192MB, Disk: 256GB Samsung SSD 850 + 128GB SAMSUNG SSD 830 + 750GB SAMSUNG HD753LJ, Graphics: MSI NVIDIA GeForce GT 420 1GB (50/135MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2330MX, Network: Broadcom NetLink BCM57788 PCIe + Broadcom BCM4321 802.11a/b/g/n
OS: Ubuntu 18.04, Kernel: 4.15.0-45-generic (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.19.6, Display Driver: NVIDIA 390.77, Compiler: GCC 7.3.0 + Clang 6.0.0-1ubuntu2, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.15rc1 + Python 3.6.7
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
GLmark2
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
vostro
Processor: Intel Core i7-2600 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Dell 0Y2MRG (A06 BIOS), Chipset: Intel 2nd Generation Core Family DRAM, Memory: 8192MB, Disk: 256GB Samsung SSD 850 + 128GB SAMSUNG SSD 830 + 750GB SAMSUNG HD753LJ, Graphics: MSI NVIDIA GeForce GT 420 1GB (50/135MHz), Audio: Realtek ALC887-VD, Monitor: DELL S2330MX, Network: Broadcom NetLink BCM57788 PCIe + Broadcom BCM4321 802.11a/b/g/n
OS: Ubuntu 18.04, Kernel: 4.15.0-45-generic (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.19.6, Display Driver: NVIDIA 390.77, Compiler: GCC 7.3.0 + Clang 6.0.0-1ubuntu2, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.15rc1 + Python 3.6.7
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
Testing initiated at 16 February 2019 10:31 by user taso.