radhaz-03212020_c-ray
Intel Xeon X5690 testing with a ASUS P6X58D PREMIUM (1501 BIOS) and Gigabyte NVIDIA GeForce GTX 1070 Ti 8GB on Solus 4.1 via the Phoronix Test Suite.
radhaz-4.5ghz-1974mt
Processor: Intel Xeon X5690 @ 3.07GHz (6 Cores / 12 Threads), Motherboard: ASUS P6X58D PREMIUM (1501 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 6 x 4096 MB 1333MT/s, Disk: 256GB SPCC Solid State + 1000GB Toshiba MKNSSDS21TB, Graphics: Gigabyte NVIDIA GeForce GTX 1070 Ti 8GB, Audio: Realtek ALC889, Monitor: Mi TV, Network: 2 x Marvell 88E8056 PCI-E + Intel Wi-Fi 6 AX200
OS: Solus 4.1, Kernel: 5.5.7-150.current (x86_64), Desktop: Budgie, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.64, Compiler: GCC 9.2.0, File-System: ext4
Compiler Notes: --build=x86_64-solus-linux --enable-__cxa_atexit --enable-clocale=gnu --enable-gnu-indirect-function --enable-gold --enable-languages=c,c++,fortran --enable-ld=default --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --target=x86_64-solus-linux --with-arch_32=i686 --with-gcc-major-version-only --with-gnu-ld --with-linker-hash-style=gnu --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
C-Ray
This is a test of C-Ray, a simple raytracer designed to test the floating-point CPU performance. This test is multi-threaded (16 threads per core), will shoot 8 rays per pixel for anti-aliasing, and will generate a 1600 x 1200 image. Learn more via the OpenBenchmarking.org test page.
radhaz-4.5ghz-1974mt
Processor: Intel Xeon X5690 @ 3.07GHz (6 Cores / 12 Threads), Motherboard: ASUS P6X58D PREMIUM (1501 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 6 x 4096 MB 1333MT/s, Disk: 256GB SPCC Solid State + 1000GB Toshiba MKNSSDS21TB, Graphics: Gigabyte NVIDIA GeForce GTX 1070 Ti 8GB, Audio: Realtek ALC889, Monitor: Mi TV, Network: 2 x Marvell 88E8056 PCI-E + Intel Wi-Fi 6 AX200
OS: Solus 4.1, Kernel: 5.5.7-150.current (x86_64), Desktop: Budgie, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.64, Compiler: GCC 9.2.0, File-System: ext4
Compiler Notes: --build=x86_64-solus-linux --enable-__cxa_atexit --enable-clocale=gnu --enable-gnu-indirect-function --enable-gold --enable-languages=c,c++,fortran --enable-ld=default --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --target=x86_64-solus-linux --with-arch_32=i686 --with-gcc-major-version-only --with-gnu-ld --with-linker-hash-style=gnu --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x1f
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 21 March 2020 00:45 by user root.