run unigine-heaven d820
Intel Pentium D 2.80GHz testing with a ASUS P5Q (1306 BIOS) and Sapphire AMD Radeon HD 6870 1GB on Ubuntu 19.04 via the Phoronix Test Suite.
Sapphire AMD Radeon HD 6870
Processor: Intel Pentium D 2.80GHz (2 Cores), Motherboard: ASUS P5Q (1306 BIOS), Chipset: Intel 4 DRAM + ICH10R, Memory: 4096MB, Disk: 480GB SanDisk SSD PLUS, Graphics: Sapphire AMD Radeon HD 6870 1GB, Audio: Realtek ALC1200, Monitor: SyncMaster, Network: Qualcomm Atheros AR8121/AR8113/AR8114
OS: Ubuntu 19.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Sapphire AMD Radeon HD 6870
Processor: Intel Pentium D 2.80GHz (2 Cores), Motherboard: ASUS P5Q (1306 BIOS), Chipset: Intel 4 DRAM + ICH10R, Memory: 4096MB, Disk: 480GB SanDisk SSD PLUS, Graphics: Sapphire AMD Radeon HD 6870 1GB, Audio: Realtek ALC1200, Monitor: SyncMaster, Network: Qualcomm Atheros AR8121/AR8113/AR8114
OS: Ubuntu 19.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 7 September 2019 12:53 by user rso.