Intel Core 2 Duo E8400 testing with a Gigabyte EP35-DS4 (F5 BIOS) and NVIDIA NV92 512MB on Ubuntu 18.04 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Gigabyte EP35-DS4 (F5 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 4096MB, Disk: 1000GB SAMSUNG HD103SJ, Graphics: NVIDIA GeForce 8800 GTS 512, Audio: Realtek ALC889A, Monitor: L1953TR, Network: Realtek RTL8111/8168/8411 + Ralink RT2800 802.11n PCI
OS: Ubuntu 18.04, Kernel: 5.0.0-37-lowlatency (x86_64), Desktop: LXDE 0.9.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, Compiler: GCC 7.4.0, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Gigabyte EP35-DS4 (F5 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 4096MB, Disk: 1000GB SAMSUNG HD103SJ, Graphics: NVIDIA NV92 512MB, Audio: Realtek ALC889A, Monitor: L1953TR, Network: Realtek RTL8111/8168/8411 + Ralink RT2800 802.11n PCI
OS: Ubuntu 18.04, Kernel: 5.0.0-37-lowlatency (x86_64), Desktop: LXDE 0.9.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.3.1 kisak-mesa PPA, Compiler: GCC 7.4.0, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Stress-NG is a Linux stress tool developed by Colin King of Canonical. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Unreal Tournament 2004 game demo from Epic Games. Learn more via the OpenBenchmarking.org test page.
Urban Terror is an open-source game that uses the ioquake3 engine. Urban Terror is a tactical first-person shooter supported on all major operating systems. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 January 2020 03:58 by user abt.
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Gigabyte EP35-DS4 (F5 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 4096MB, Disk: 1000GB SAMSUNG HD103SJ, Graphics: NVIDIA GeForce 8800 GTS 512, Audio: Realtek ALC889A, Monitor: L1953TR, Network: Realtek RTL8111/8168/8411 + Ralink RT2800 802.11n PCI
OS: Ubuntu 18.04, Kernel: 5.0.0-37-lowlatency (x86_64), Desktop: LXDE 0.9.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, Compiler: GCC 7.4.0, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 January 2020 04:07 by user abt.
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 January 2020 04:43 by user abt.
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 January 2020 04:49 by user abt.
Processor: Intel Core 2 Duo E8400 @ 3.00GHz (2 Cores), Motherboard: Gigabyte EP35-DS4 (F5 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9R, Memory: 4096MB, Disk: 1000GB SAMSUNG HD103SJ, Graphics: NVIDIA NV92 512MB, Audio: Realtek ALC889A, Monitor: L1953TR, Network: Realtek RTL8111/8168/8411 + Ralink RT2800 802.11n PCI
OS: Ubuntu 18.04, Kernel: 5.0.0-37-lowlatency (x86_64), Desktop: LXDE 0.9.3, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.3.1 kisak-mesa PPA, Compiler: GCC 7.4.0, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 4 January 2020 05:15 by user abt.