glmark2 new
Intel Xeon E5-1680 v3 testing with a ASUS X99-A (3902 BIOS) and eVGA NVIDIA NVE7 1GB on Ubuntu 20.04 via the Phoronix Test Suite.
eVGA NVIDIA NVE7
Processor: Intel Xeon E5-1680 v3 @ 3.80GHz (8 Cores / 16 Threads), Motherboard: ASUS X99-A (3902 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 16GB, Disk: PNY CS900 240GB, Graphics: eVGA NVIDIA NVE7 1GB, Audio: Realtek ALC1150, Monitor: G237HL, Network: Intel I218-V
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x43
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
GLmark2
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
eVGA NVIDIA NVE7
Processor: Intel Xeon E5-1680 v3 @ 3.80GHz (8 Cores / 16 Threads), Motherboard: ASUS X99-A (3902 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 16GB, Disk: PNY CS900 240GB, Graphics: eVGA NVIDIA NVE7 1GB, Audio: Realtek ALC1150, Monitor: G237HL, Network: Intel I218-V
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.3 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x43
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 September 2020 12:23 by user phoronix.