2500K
Intel Core i5-2500K testing with a SAPPHIRE Pure Black P67 Hydra (4.6.4 BIOS) and ASUS AMD Radeon HD 4890 1GB on Ubuntu 19.04 via the Phoronix Test Suite.
Core i5 2500K
Processor: Intel Core i5-2500K @ 3.70GHz (4 Cores), Motherboard: SAPPHIRE Pure Black P67 Hydra (4.6.4 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 3072MB, Disk: 120GB SanDisk SDSSDA12, Graphics: ASUS AMD Radeon HD 4890 1GB, Audio: Realtek ALC892, Monitor: VA2431, Network: Marvell 88E8057 PCI-E
OS: Ubuntu 19.04, Kernel: 5.0.0-15-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.2 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
OSPray
Embree
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs. Learn more via the OpenBenchmarking.org test page.
LuxCoreRender
Core i5 2500K
Processor: Intel Core i5-2500K @ 3.70GHz (4 Cores), Motherboard: SAPPHIRE Pure Black P67 Hydra (4.6.4 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 3072MB, Disk: 120GB SanDisk SDSSDA12, Graphics: ASUS AMD Radeon HD 4890 1GB, Audio: Realtek ALC892, Monitor: VA2431, Network: Marvell 88E8057 PCI-E
OS: Ubuntu 19.04, Kernel: 5.0.0-15-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.2 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 29 September 2019 08:02 by user phoronix.