Intel Core i7-8700 testing with a Gigabyte Z390 DESIGNARE-CF (F7 BIOS) and Gigabyte NVIDIA GeForce GTX 1650 4GB on Ubuntu 18.04 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z390 DESIGNARE-CF (F7 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 8192 MB DDR4-2400MT/s, Disk: Samsung SSD 970 EVO 250GB + 31GB SD/MMC, Graphics: Gigabyte NVIDIA GeForce GTX 1650 4GB (1395/4001MHz), Audio: Realtek ALC1220, Monitor: ASUS PA238, Network: Intel I219-V + Intel I211 + Intel-AC 9560
OS: Ubuntu 18.04, Kernel: 5.0.0-37-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.36, OpenGL: 4.6.0, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate powersave
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 April 2020 22:11 by user root.
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z390 DESIGNARE-CF (F7 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 8192 MB DDR4-2400MT/s, Disk: Samsung SSD 970 EVO 250GB + 31GB SD/MMC, Graphics: Gigabyte NVIDIA GeForce GTX 1650 4GB (1395/4001MHz), Audio: Realtek ALC1220, Monitor: ASUS PA238, Network: Intel I219-V + Intel I211 + Intel-AC 9560
OS: Ubuntu 18.04, Kernel: 5.0.0-37-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.5, Display Driver: NVIDIA 440.36, OpenGL: 4.6.0, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 April 2020 22:24 by user root.