gaminggear
Intel Core i7-2600K testing with a ASUS MAXIMUS IV GENE-Z/GEN3 (3603 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X 8GB on Ubuntu 19.04 via the Phoronix Test Suite.
t4bseptember
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
tb4run2
tb4run03
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS MAXIMUS IV GENE-Z/GEN3 (3603 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 16384MB, Disk: 2500GB Western Digital WD25EZRX-00M + 1000GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X 8GB (1266/2000MHz), Audio: Realtek ALC889, Monitor: FS2735, Network: Intel 82579V
OS: Ubuntu 19.04, Kernel: 5.0.0-29-lowlatency (x86_64), Desktop: KDE Plasma 5.15.4, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0 + Clang 8.0.0-3 + LLVM 8.0.0, File-System: ext4, Screen Resolution: 2560x1440
Nexuiz
This is a benchmark of Nexuiz, a popular open-source first-person shooter. This game uses the DarkPlaces engine, which is a largely modified version of the Quake engine with extra features such as High Dynamic Range rendering and OpenGL 2.0 shaders. Learn more via the OpenBenchmarking.org test page.
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Tesseract
Tesseract is a fork of Cube 2 Sauerbraten with numerous graphics and game-play improvements. Tesseract has been in development since 2012 while its first release happened in May of 2014. Learn more via the OpenBenchmarking.org test page.
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Superposition
This test calculates the average frame-rate within the Superposition demo for the Unigine engine, released in 2017. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Valley
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
t4bseptember
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 28 September 2019 10:34 by user cmk.
tb4run2
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 28 September 2019 15:05 by user cmk.
tb4run03
Processor: Intel Core i7-2600K @ 5.90GHz (4 Cores / 8 Threads), Motherboard: ASUS MAXIMUS IV GENE-Z/GEN3 (3603 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 16384MB, Disk: 2500GB Western Digital WD25EZRX-00M + 1000GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X 8GB (1266/2000MHz), Audio: Realtek ALC889, Monitor: FS2735, Network: Intel 82579V
OS: Ubuntu 19.04, Kernel: 5.0.0-29-lowlatency (x86_64), Desktop: KDE Plasma 5.15.4, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0 + Clang 8.0.0-3 + LLVM 8.0.0, File-System: ext4, Screen Resolution: 2560x1440
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 28 September 2019 19:01 by user cmk.