Intel Core i7-8700 testing with a Dell 0654JC (1.2.22 BIOS) and Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Dell 0654JC (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: KXG60ZNV512G NVMe TOSHIBA 512GB + 2000GB Samsung SSD 860, Graphics: Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC3234, Monitor: DELL U2715H + DELL U2719DC, Network: Intel I219-V + Intel-AC 9560
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 4000x2560
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 18:56 by user otoomet.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 19:19 by user otoomet.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 19:35 by user otoomet.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 19:52 by user otoomet.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 20:26 by user otoomet.
Processor: Intel Core i7-8700 @ 4.60GHz (6 Cores / 12 Threads), Motherboard: Dell 0654JC (1.2.22 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: KXG60ZNV512G NVMe TOSHIBA 512GB + 2000GB Samsung SSD 860, Graphics: Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC3234, Monitor: DELL U2715H + DELL U2719DC, Network: Intel I219-V + Intel-AC 9560
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 4000x2560
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 October 2020 20:47 by user otoomet.