madmaxbench
coolmachine
tedtingphoronix
Processor: Intel Xeon E5-2690 0 @ 3.80GHz (8 Cores / 16 Threads), Motherboard: RUNING X79 (4.6.5 BIOS), Chipset: Intel Xeon E5/Core, Memory: 16384MB, Disk: 1500GB SAMSUNG HD154UI + 127GB 128GB, Graphics: eVGA NVIDIA GeForce GTX 1070 8GB (1594/4006MHz), Audio: Realtek ALC662 rev1, Monitor: CMC 22 W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 18.10, Kernel: 4.18.0-17-generic (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.1, Display Driver: NVIDIA 418.56, OpenGL: 4.6.0, Vulkan: 1.1.95, Compiler: GCC 8.2.0 + Clang 7.0.0-3, File-System: ext4, Screen Resolution: 1680x1050
Kernel Notes: vfio_pci.ids=1002:687f 1002:aaf8
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW STIBP + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
Mad Max
This is a benchmark of Mad Max on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Learn more via the OpenBenchmarking.org test page.
tedtingphoronix
Processor: Intel Xeon E5-2690 0 @ 3.80GHz (8 Cores / 16 Threads), Motherboard: RUNING X79 (4.6.5 BIOS), Chipset: Intel Xeon E5/Core, Memory: 16384MB, Disk: 1500GB SAMSUNG HD154UI + 127GB 128GB, Graphics: eVGA NVIDIA GeForce GTX 1070 8GB (1594/4006MHz), Audio: Realtek ALC662 rev1, Monitor: CMC 22 W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 18.10, Kernel: 4.18.0-17-generic (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.1, Display Driver: NVIDIA 418.56, OpenGL: 4.6.0, Vulkan: 1.1.95, Compiler: GCC 8.2.0 + Clang 7.0.0-3, File-System: ext4, Screen Resolution: 1680x1050
Kernel Notes: vfio_pci.ids=1002:687f 1002:aaf8
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW STIBP + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable
Testing initiated at 11 April 2019 21:57 by user rlusk.