Intel 0000 testing with a ASRock X99 Taichi (P1.80 BIOS) and ASUS NVIDIA GeForce GTX 1080 Ti 11GB on LinuxMint 19.1 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled
Processor: Intel 0000 @ 2.60GHz (14 Cores / 28 Threads), Motherboard: ASRock X99 Taichi (P1.80 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 129024MB, Disk: Samsung SSD 960 EVO 250GB + Samsung SSD 960 EVO 500GB + 2 x 4001GB Western Digital WD40EZRZ-00W + 2000GB Western Digital WD20EZRZ-00Z + 120GB Samsung SSD 840 + 2 x 2000GB Seagate ST2000DL003-9VT1 + 240GB INTEL SSDSC2BW24, Graphics: ASUS NVIDIA GeForce GTX 1080 Ti 11GB (1556/5508MHz), Audio: Realtek ALC1150, Monitor: LG ULTRAWIDE, Network: Intel I218-V + Intel I211 + Intel 3160
OS: LinuxMint 19.1, Kernel: 5.1.5-050105-lowlatency (x86_64), Desktop: Cinnamon 4.0.10, Display Server: X Server 1.19.6, Display Driver: NVIDIA 430.14, OpenGL: 4.6.0, File-System: ext4, Screen Resolution: 8560x1440
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 5 June 2019 18:14 by user jason.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 5 June 2019 18:39 by user jason.
Processor: Intel 0000 @ 2.60GHz (14 Cores / 28 Threads), Motherboard: ASRock X99 Taichi (P1.80 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 129024MB, Disk: Samsung SSD 960 EVO 250GB + Samsung SSD 960 EVO 500GB + 2 x 4001GB Western Digital WD40EZRZ-00W + 2000GB Western Digital WD20EZRZ-00Z + 120GB Samsung SSD 840 + 2 x 2000GB Seagate ST2000DL003-9VT1 + 240GB INTEL SSDSC2BW24, Graphics: ASUS NVIDIA GeForce GTX 1080 Ti 11GB (1556/5508MHz), Audio: Realtek ALC1150, Monitor: LG ULTRAWIDE, Network: Intel I218-V + Intel I211 + Intel 3160
OS: LinuxMint 19.1, Kernel: 5.1.5-050105-lowlatency (x86_64), Desktop: Cinnamon 4.0.10, Display Server: X Server 1.19.6, Display Driver: NVIDIA 430.14, OpenGL: 4.6.0, File-System: ext4, Screen Resolution: 8560x1440
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 5 June 2019 19:14 by user jason.