Intel Xeon 5130 testing with a Dell 0GU083 (A08 BIOS) and HIS AMD Radeon HD 6770 1GB on Ubuntu 19.04 via the Phoronix Test Suite.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 16:37 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 17:08 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 18:31 by user user.
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 1 September 2019 12:16 by user user.