Intel Core 2 Duo E8400 testing with a Dell 0TP412 (A14 BIOS) and HIS AMD Radeon HD 6770 1GB on Ubuntu 19.04 via the Phoronix Test Suite.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Changed Graphics to AMD Radeon HD 5770 1GB.
Changed Graphics to HIS AMD Radeon HD 6770 1GB.
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Dell 0TP412 (A14 BIOS), Chipset: Intel 82X38/X48 + ICH9R, Memory: 4096MB, Disk: 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: Intel 82801I, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5754 PCI
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Valve's Dota 2 game. The test profile assumes you have a Steam account, have Steam installed for the system, and that you have rights to Dota 2. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 16:37 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 17:08 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 31 August 2019 18:31 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 1 September 2019 12:16 by user user.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 1 September 2019 12:57 by user misium.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 1 September 2019 19:35 by user misium.
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 01:40 by user misium.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 02:34 by user misium.
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 02:47 by user misium.
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: AMD Radeon HD 5770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 03:05 by user misium.
Processor: Intel Xeon 5130 (2 Cores), Motherboard: Dell 0GU083 (A08 BIOS), Chipset: Intel 5000X MCH, Memory: 4096MB, Disk: 2 x 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: SigmaTel STAC9200, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5752 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 03:25 by user misium.
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Dell 0TP412 (A14 BIOS), Chipset: Intel 82X38/X48 + ICH9R, Memory: 4096MB, Disk: 80GB Western Digital WD800JD-55MU, Graphics: HIS AMD Radeon HD 6770 1GB, Audio: Intel 82801I, Monitor: SyncMaster, Network: Broadcom NetXtreme BCM5754 PCI
OS: Ubuntu 19.04, Kernel: 5.0.0-25-lowlatency (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 2 September 2019 08:12 by user misium.