Core i7 7740X Linux
Intel Core i7-7740K testing with a Gigabyte X299 AORUS Gaming-CF (F4d BIOS) and MSI NVIDIA GeForce GT 1030 2GB on Ubuntu 18.10 via the Phoronix Test Suite.
Core i7 7740X
Processor: Intel Core i7-7740K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte X299 AORUS Gaming-CF (F4d BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: 120GB Force MP500, Graphics: MSI NVIDIA GeForce GT 1030 2GB, Audio: Realtek ALC1220, Network: Intel I219-V
OS: Ubuntu 18.10, Kernel: 4.18.0-25-generic (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.1, Display Driver: modesetting 1.20.1, Compiler: GCC 8.3.0, File-System: ext4
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Embree
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs. Learn more via the OpenBenchmarking.org test page.
Core i7 7740X
Processor: Intel Core i7-7740K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte X299 AORUS Gaming-CF (F4d BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8192MB, Disk: 120GB Force MP500, Graphics: MSI NVIDIA GeForce GT 1030 2GB, Audio: Realtek ALC1220, Network: Intel I219-V
OS: Ubuntu 18.10, Kernel: 4.18.0-25-generic (x86_64), Desktop: GNOME Shell 3.30.2, Display Server: X Server 1.20.1, Display Driver: modesetting 1.20.1, Compiler: GCC 8.3.0, File-System: ext4
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 28 September 2019 12:28 by user phoronix.