Intel Xeon E5-1680 v2 testing with a Supermicro X9SRA/X9SRA-3 v0123456789 (3.2 BIOS) and XFX AMD Radeon RX 5600 OEM/5600 XT / 5700/5700 8GB on Gentoo/Linux via the Phoronix Test Suite.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-altivec --disable-esp --disable-fixed-point --disable-isl-version-check --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-isl --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Xeon E5-1680 v2 @ 3.70GHz (8 Cores / 16 Threads), Motherboard: Supermicro X9SRA/X9SRA-3 v0123456789 (3.2 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 126GB, Disk: HP SSD EX950 512GB + 10001GB Western Digital WD101EMAZ-11 + 10001GB Western Digital WD100EMAZ-00, Graphics: XFX AMD Radeon RX 5600 OEM/5600 XT / 5700/5700 8GB (2055/875MHz), Audio: Realtek ALC889, Monitor: AORUS CV27F, Network: Intel 82579LM + Intel 82574L + Qualcomm Atheros AR93xx
OS: Gentoo/Linux, Kernel: 5.7.4-gentoo (x86_64), Desktop: KDE Plasma 5.19.1, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 9.0.1), OpenCL: OpenCL 2.1 AMD-APP (3110.6), Compiler: GCC 9.3.0 + LLVM 9.0.1, File-System: zfs, Screen Resolution: 1920x1080
Processor: Intel Xeon E5-1680 v2 @ 3.70GHz (8 Cores / 16 Threads), Motherboard: Supermicro X9SRA/X9SRA-3 v0123456789 (3.2 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 126GB, Disk: HP SSD EX950 512GB + 10001GB Western Digital WD101EMAZ-11 + 10001GB Western Digital WD100EMAZ-00 + 31GB Ultra Fit, Graphics: XFX AMD Radeon RX 5600 OEM/5600 XT / 5700/5700 8GB (2055/875MHz), Audio: Realtek ALC889, Monitor: AORUS CV27F, Network: Intel 82579LM + Intel 82574L + Qualcomm Atheros AR93xx
OS: Gentoo/Linux, Kernel: 5.7.4-gentoo (x86_64), Desktop: KDE Plasma 5.19.2, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 9.0.1), OpenCL: OpenCL 2.1 AMD-APP (3110.6), Compiler: GCC 9.3.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: zfs, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
The Himeno benchmark is a linear solver of pressure Poisson using a point-Jacobi method. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Darktable is an open-source photography / workflow application this will use any system-installed Darktable program or on Windows will automatically download the pre-built binary from the project. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-altivec --disable-esp --disable-fixed-point --disable-isl-version-check --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-isl --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 June 2020 01:59 by user r2d2fish.
Processor: Intel Xeon E5-1680 v2 @ 3.70GHz (8 Cores / 16 Threads), Motherboard: Supermicro X9SRA/X9SRA-3 v0123456789 (3.2 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 126GB, Disk: HP SSD EX950 512GB + 10001GB Western Digital WD101EMAZ-11 + 10001GB Western Digital WD100EMAZ-00, Graphics: XFX AMD Radeon RX 5600 OEM/5600 XT / 5700/5700 8GB (2055/875MHz), Audio: Realtek ALC889, Monitor: AORUS CV27F, Network: Intel 82579LM + Intel 82574L + Qualcomm Atheros AR93xx
OS: Gentoo/Linux, Kernel: 5.7.4-gentoo (x86_64), Desktop: KDE Plasma 5.19.1, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 9.0.1), OpenCL: OpenCL 2.1 AMD-APP (3110.6), Compiler: GCC 9.3.0 + LLVM 9.0.1, File-System: zfs, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-altivec --disable-esp --disable-fixed-point --disable-isl-version-check --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-isl --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 June 2020 02:09 by user r2d2fish.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.3.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0 --disable-altivec --disable-esp --disable-fixed-point --disable-isl-version-check --disable-libada --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.3.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/man --with-isl --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.3.0/python
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 June 2020 22:31 by user r2d2fish.
Processor: Intel Xeon E5-1680 v2 @ 3.70GHz (8 Cores / 16 Threads), Motherboard: Supermicro X9SRA/X9SRA-3 v0123456789 (3.2 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 126GB, Disk: HP SSD EX950 512GB + 10001GB Western Digital WD101EMAZ-11 + 10001GB Western Digital WD100EMAZ-00 + 31GB Ultra Fit, Graphics: XFX AMD Radeon RX 5600 OEM/5600 XT / 5700/5700 8GB (2055/875MHz), Audio: Realtek ALC889, Monitor: AORUS CV27F, Network: Intel 82579LM + Intel 82574L + Qualcomm Atheros AR93xx
OS: Gentoo/Linux, Kernel: 5.7.4-gentoo (x86_64), Desktop: KDE Plasma 5.19.2, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 9.0.1), OpenCL: OpenCL 2.1 AMD-APP (3110.6), Compiler: GCC 9.3.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: zfs, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x42e
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 June 2020 23:30 by user r2d2fish.