Threadripper_Test1
Intel Core i9-9900K testing with a EVGA 121-KS-E375 v1.0 (1.09 BIOS) and ASUS NVIDIA GeForce GTX 1080 Ti 11GB on Gentoo 2.7 via the Phoronix Test Suite.
Standard
Processor: AMD Ryzen Threadripper 3960X 24-Core @ 3.80GHz (24 Cores / 48 Threads), Motherboard: MSI TRX40 PRO 10G (MS-7C60) (1.50 BIOS), Memory: 4 x 16384 MB 1600MHz F4-3200C16-16GVK, Disk: 2 x 3726GB WDC WD4000FYYZ-01UL1B2 + 932GB CT1000BX500SSD1 + 2 x 932GB WDS100T3X0C-00SJG0 + 3726GB WD Elements SE 25FF USB, Graphics: NVIDIA GeForce GTX 1080 Ti + NVIDIA Quadro RTX 4000 + Microsoft Remote Display + NVIDIA GeForce GTX 1080 11GB (1999/5505MHz), Network: Intel I211 Gigabit Connection + Intel I211 Gigabit Connection #2
OS: Microsoft Windows 10 Pro Build 18363, Kernel: 10.0 (x86_64), Display Driver: 441.66 (26.21.14.4166), File-System: NTFS, Screen Resolution: 1920x1080
Security Notes: __user pointer sanitization: Disabled + Retpoline: Full + IBPB: Always + STIBP: Enabled
9900K 52x52x49 DDR4-4133
Processor: Intel Core i9-9900K @ 5.20GHz (8 Cores / 16 Threads), Motherboard: EVGA 121-KS-E375 v1.0 (1.09 BIOS), Chipset: Intel 8th/9th, Memory: 16GB, Disk: Samsung SSD 970 EVO 500GB + 256GB PLEXTOR PX-256M6 + 240GB KINGSTON SH103S3 + 2000GB Western Digital WD2003FZEX-0 + 2000GB Samsung SSD 860, Graphics: ASUS NVIDIA GeForce GTX 1080 Ti 11GB, Audio: NVIDIA GP102 HDMI Audio, Monitor: XB271HU, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.4.37-ck (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.20.8, Vulkan: 1.2.133, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1 + CUDA 10.2, File-System: reiserfs
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x98
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
GIMP
GIMP is an open-source image manipulaton program. This test profile will use the system-provided GIMP program otherwise on Windows relys upon a pre-packaged Windows binary from upstream GIMP.org. Learn more via the OpenBenchmarking.org test page.
Standard
Processor: AMD Ryzen Threadripper 3960X 24-Core @ 3.80GHz (24 Cores / 48 Threads), Motherboard: MSI TRX40 PRO 10G (MS-7C60) (1.50 BIOS), Memory: 4 x 16384 MB 1600MHz F4-3200C16-16GVK, Disk: 2 x 3726GB WDC WD4000FYYZ-01UL1B2 + 932GB CT1000BX500SSD1 + 2 x 932GB WDS100T3X0C-00SJG0 + 3726GB WD Elements SE 25FF USB, Graphics: NVIDIA GeForce GTX 1080 Ti + NVIDIA Quadro RTX 4000 + Microsoft Remote Display + NVIDIA GeForce GTX 1080 11GB (1999/5505MHz), Network: Intel I211 Gigabit Connection + Intel I211 Gigabit Connection #2
OS: Microsoft Windows 10 Pro Build 18363, Kernel: 10.0 (x86_64), Display Driver: 441.66 (26.21.14.4166), File-System: NTFS, Screen Resolution: 1920x1080
Security Notes: __user pointer sanitization: Disabled + Retpoline: Full + IBPB: Always + STIBP: Enabled
Testing initiated at 21 August 2020 12:12 by user fHerman.
9900K 52x52x49 DDR4-4133
Processor: Intel Core i9-9900K @ 5.20GHz (8 Cores / 16 Threads), Motherboard: EVGA 121-KS-E375 v1.0 (1.09 BIOS), Chipset: Intel 8th/9th, Memory: 16GB, Disk: Samsung SSD 970 EVO 500GB + 256GB PLEXTOR PX-256M6 + 240GB KINGSTON SH103S3 + 2000GB Western Digital WD2003FZEX-0 + 2000GB Samsung SSD 860, Graphics: ASUS NVIDIA GeForce GTX 1080 Ti 11GB, Audio: NVIDIA GP102 HDMI Audio, Monitor: XB271HU, Network: Intel I219-V
OS: Gentoo 2.7, Kernel: 5.4.37-ck (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.20.8, Vulkan: 1.2.133, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1 + CUDA 10.2, File-System: reiserfs
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x98
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 21 August 2020 13:03 by user cha.