Intel Core i7-8086K testing with a ASRock Z370 Extreme4 (P3.10 BIOS) and NVIDIA GeForce RTX 2080 8GB on VHM Linux From Scratch 20200401-systemd-multilib via the Phoronix Test Suite.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK + 64GB Flash Drive FIT, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.4 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.6, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.3 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.6, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK + 128GB Flash Drive FIT, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.6 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32GB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 126GB SanDisk SDSSDP12 + 8002GB Backup+ Hub BK + 1000GB 500SSD1, Graphics: NVIDIA GeForce RTX 2080 8GB (750/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 20200401-systemd-multilib, Kernel: 5.6.3 (x86_64), Desktop: Xfce 4.15, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.5.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m64,m32
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x96
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32GB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/8000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 20200401-systemd-multilib, Kernel: 5.6.5 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.5.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 4480x1440
OSBench is a collection of micro-benchmarks for measuring operating system primitives like time to create threads/processes, launching programs, creating files, and memory allocation. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK + 64GB Flash Drive FIT, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.4 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.6, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 16 February 2020 11:47 by user skeetre.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK + 64GB Flash Drive FIT, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.3 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.6, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 16 February 2020 14:26 by user skeetre.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32768MB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK + 128GB Flash Drive FIT, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 9.0-systemd, Kernel: 5.5.6 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.59, OpenGL: 4.5.0, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m32,m64
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 24 February 2020 21:31 by user skeetre.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32GB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 126GB SanDisk SDSSDP12 + 8002GB Backup+ Hub BK + 1000GB 500SSD1, Graphics: NVIDIA GeForce RTX 2080 8GB (750/7000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 20200401-systemd-multilib, Kernel: 5.6.3 (x86_64), Desktop: Xfce 4.15, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.5.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m64,m32
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x96
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 12 April 2020 18:45 by user skeetre.
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASRock Z370 Extreme4 (P3.10 BIOS), Memory: 32GB, Disk: 1000GB Samsung SSD 970 EVO 1TB + 128GB SAMSUNG MZNLN128 + 8002GB Western Digital WD80EMAZ-00W + 4001GB Western Digital WD40EMRX-82U + 1000GB CT1000MX500SSD1 + 8002GB Backup+ Hub BK, Graphics: NVIDIA GeForce RTX 2080 8GB (1515/8000MHz), Audio: Realtek ALC1220, Monitor: XB271HU
OS: VHM Linux From Scratch 20200401-systemd-multilib, Kernel: 5.6.5 (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.82, OpenGL: 4.5.0, Compiler: GCC 9.3.0 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 4480x1440
Compiler Notes: --disable-bootstrap --enable-languages=c,c++ --enable-multilib --with-multilib-list=m64,m32
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x96
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 20 April 2020 14:25 by user skeetre.