Lenny_glmark2_HD
Intel Core i7-6600U testing with a Dell 0T6HHJ (1.22.8 BIOS) and Intel Skylake GT2 [HD 520] on Ubuntu 20.04 via the Phoronix Test Suite.
Lenny GLMARK2
Processor: Intel Core i5-6200U @ 2.80GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20GKS0D800 (R0CET40W 1.28 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32GB, Disk: 256GB SAMSUNG MZNTY256, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC293, Network: Intel I219-V + Intel 8260
OS: Ubuntu 20.10, Kernel: 5.8.0-44-generic (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server 1.20.9, Vulkan: 1.2.145, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 2.3
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Desky_glmark3_HD
Processor: Intel Xeon E3-1225 v3 @ 3.60GHz (4 Cores), Motherboard: Dell 0VD5HY (A20 BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 4 x 8192 MB DDR3-1600MT/s Kingston, Disk: 480GB KINGSTON SHSS37A + 128GB SAMSUNG MZ7PC128 + 2 x 2000GB Western Digital WD2005FBYZ-0, Graphics: AMD FirePro W2100 2GB (300/900MHz), Audio: AMD Oland/Hainan/Cape, Monitor: T27D390 + BenQ GW2760, Network: Intel I217-LM + 2 x Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.4.0-66-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, OpenGL: 4.5 Mesa 20.2.6 (LLVM 11.0.0), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x28 - Thermald 1.9.1
Python Notes: Python 2.7.18 + Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Worky
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0T6HHJ (1.22.8 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 8192 MB DDR4-2133MT/s Samsung M471A1G43EB1-CPB, Disk: 512GB SAMSUNG MZHPV512, Graphics: Intel Skylake GT2 [HD 520] (1050MHz), Audio: Realtek ALC3235, Monitor: 2 x S24C750, Network: Intel I219-LM + Intel 8260
OS: Ubuntu 20.04, Kernel: 5.8.0-44-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
GLmark2
This is a test of Linaro's glmark2 port, currently using the X11 OpenGL 2.0 target. GLmark2 is a basic OpenGL benchmark. Learn more via the OpenBenchmarking.org test page.
Lenny GLMARK2
Processor: Intel Core i5-6200U @ 2.80GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20GKS0D800 (R0CET40W 1.28 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32GB, Disk: 256GB SAMSUNG MZNTY256, Graphics: Intel Skylake GT2 [HD 520] (1000MHz), Audio: Realtek ALC293, Network: Intel I219-V + Intel 8260
OS: Ubuntu 20.10, Kernel: 5.8.0-44-generic (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server 1.20.9, Vulkan: 1.2.145, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 2.3
Python Notes: Python 3.8.6
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 7 March 2021 08:29 by user remo.
Desky_glmark3_HD
Processor: Intel Xeon E3-1225 v3 @ 3.60GHz (4 Cores), Motherboard: Dell 0VD5HY (A20 BIOS), Chipset: Intel Xeon E3-1200 v3 DRAM, Memory: 4 x 8192 MB DDR3-1600MT/s Kingston, Disk: 480GB KINGSTON SHSS37A + 128GB SAMSUNG MZ7PC128 + 2 x 2000GB Western Digital WD2005FBYZ-0, Graphics: AMD FirePro W2100 2GB (300/900MHz), Audio: AMD Oland/Hainan/Cape, Monitor: T27D390 + BenQ GW2760, Network: Intel I217-LM + 2 x Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.4.0-66-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, OpenGL: 4.5 Mesa 20.2.6 (LLVM 11.0.0), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x28 - Thermald 1.9.1
Python Notes: Python 2.7.18 + Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 7 March 2021 09:00 by user root.
Worky
Processor: Intel Core i7-6600U @ 3.40GHz (2 Cores / 4 Threads), Motherboard: Dell 0T6HHJ (1.22.8 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2 x 8192 MB DDR4-2133MT/s Samsung M471A1G43EB1-CPB, Disk: 512GB SAMSUNG MZHPV512, Graphics: Intel Skylake GT2 [HD 520] (1050MHz), Audio: Realtek ALC3235, Monitor: 2 x S24C750, Network: Intel I219-LM + Intel 8260
OS: Ubuntu 20.04, Kernel: 5.8.0-44-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe2 - Thermald 1.9.1
Python Notes: Python 3.8.5
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 8 March 2021 13:19 by user root.