GPU compute
Intel Core i3-6300 testing with a ASUS PRIME H270-PLUS (1205 BIOS) and Gigabyte NVIDIA GeForce GTX 660 2GB on Ubuntu 18.04 via the Phoronix Test Suite.
GTX 660
Processor: Intel Core i3-6300 @ 3.80GHz (2 Cores / 4 Threads), Motherboard: ASUS PRIME H270-PLUS (1205 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500 + H270, Memory: 8GB, Disk: 500GB Seagate ST9500325AS, Graphics: Gigabyte NVIDIA GeForce GTX 660 2GB, Audio: NVIDIA GK106 HDMI Audio, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 18.04, Kernel: 4.15.0-106-generic (x86_64), OpenCL: OpenCL 1.2 CUDA 10.2.159, Vulkan: 1.1.119, Compiler: GCC 7.5.0, File-System: zfs, Screen Resolution: 640x480
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xdc
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL or CUDA is supported. Learn more via the OpenBenchmarking.org test page.
GTX 660
Processor: Intel Core i3-6300 @ 3.80GHz (2 Cores / 4 Threads), Motherboard: ASUS PRIME H270-PLUS (1205 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500 + H270, Memory: 8GB, Disk: 500GB Seagate ST9500325AS, Graphics: Gigabyte NVIDIA GeForce GTX 660 2GB, Audio: NVIDIA GK106 HDMI Audio, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 18.04, Kernel: 4.15.0-106-generic (x86_64), OpenCL: OpenCL 1.2 CUDA 10.2.159, Vulkan: 1.1.119, Compiler: GCC 7.5.0, File-System: zfs, Screen Resolution: 640x480
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xdc
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 26 November 2020 10:09 by user hydrosaure.