Intel Core i7-8700 testing with a Gigabyte Z390 DESIGNARE-CF (F7 BIOS) and EFI VGA on Ubuntu 16.04 via the Phoronix Test Suite.
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z390 DESIGNARE-CF (F7 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 31GB Ultra USB 3.0, Graphics: EFI VGA, Audio: Realtek ALC1220, Monitor: ASUS PA238, Network: Intel I219-V + Intel I211 + Intel-AC 9560
OS: Ubuntu 16.04, Kernel: 4.15.0-74-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Compiler: GCC 5.4.0 20160609 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
Environment Notes: DBUS_DEBUG_OUTPUT=1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Environment Notes: DBUS_DEBUG_OUTPUT=1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Environment Notes: DBUS_DEBUG_OUTPUT=1
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
OS: Ubuntu 16.04, Kernel: 4.15.0-74-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: NVIDIA 440.33.01, OpenGL: 4.5.0, Compiler: GCC 5.4.0 20160609 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
The CUDA version of Harrism's mini-nbody tests. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z390 DESIGNARE-CF (F7 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 31GB Ultra USB 3.0, Graphics: EFI VGA, Audio: Realtek ALC1220, Monitor: ASUS PA238, Network: Intel I219-V + Intel I211 + Intel-AC 9560
OS: Ubuntu 16.04, Kernel: 4.15.0-74-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Compiler: GCC 5.4.0 20160609 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
Environment Notes: DBUS_DEBUG_OUTPUT=1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.12 + Python 3.5.2
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 January 2020 00:27 by user test.
Environment Notes: DBUS_DEBUG_OUTPUT=1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 January 2020 00:42 by user test.
Environment Notes: DBUS_DEBUG_OUTPUT=1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 January 2020 01:26 by user test.
Environment Notes: DBUS_DEBUG_OUTPUT=1
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 January 2020 01:32 by user test.
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z390 DESIGNARE-CF (F7 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 31GB Ultra USB 3.0, Graphics: EFI VGA, Audio: Realtek ALC1220, Monitor: ASUS PA238, Network: Intel I219-V + Intel I211 + Intel-AC 9560
OS: Ubuntu 16.04, Kernel: 4.15.0-74-generic (x86_64), Desktop: Unity 7.4.5, Display Server: X Server 1.19.6, Display Driver: NVIDIA 440.33.01, OpenGL: 4.5.0, Compiler: GCC 5.4.0 20160609 + CUDA 10.2, File-System: ext4, Screen Resolution: 1920x1080
Environment Notes: DBUS_DEBUG_OUTPUT=1
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 January 2020 01:46 by user test.