output
docker testing on Ubuntu 16.04 via the Phoronix Test Suite.
ASUS NVIDIA GeForce GT 730
Processor: Intel Core i7-2600 @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8P67 WS REVOLUTION (1601 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 12288MB, Disk: 1000GB Seagate ST31000528AS + 16GB USB Flash Drive, Graphics: ASUS NVIDIA GeForce GT 730 4GB (699/549MHz), Audio: Realtek ALC889, Network: Intel 82579V + Intel 82574L
OS: Ubuntu 16.04, Kernel: 4.9.0-9-amd64 (x86_64), Display Server: X Server 1.18.4, Display Driver: NVIDIA 390.116, OpenGL: 4.5.0, Compiler: GCC 5.4.0 20160609, File-System: overlayfs, System Layer: docker
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
GLmark2
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
ASUS NVIDIA GeForce GT 730
Processor: Intel Core i7-2600 @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS P8P67 WS REVOLUTION (1601 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 12288MB, Disk: 1000GB Seagate ST31000528AS + 16GB USB Flash Drive, Graphics: ASUS NVIDIA GeForce GT 730 4GB (699/549MHz), Audio: Realtek ALC889, Network: Intel 82579V + Intel 82574L
OS: Ubuntu 16.04, Kernel: 4.9.0-9-amd64 (x86_64), Display Server: X Server 1.18.4, Display Driver: NVIDIA 390.116, OpenGL: 4.5.0, Compiler: GCC 5.4.0 20160609, File-System: overlayfs, System Layer: docker
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 25 June 2019 12:09 by user root.