Intel Core i9-7900X testing with a ASUS PRIME X299-DELUXE (3105 BIOS) and ASUS AMD Radeon RX 56/64 8GB on Arch rolling via the Phoronix Test Suite.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Intel Core i9-7900X @ 4.50GHz (10 Cores / 20 Threads), Motherboard: ASUS PRIME X299-DELUXE (3105 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 1024GB INTEL SSDPEKNW010T8 + 256GB Western Digital WDS256G1X0C-00ENX0 + 4001GB Western Digital WD4004FZWX-0, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/1100MHz), Audio: Realtek ALC1220, Monitor: C27HG7x, Network: Intel I219-V + Intel I211 + Qualcomm Atheros QCA6174 802.11ac
OS: Arch rolling, Kernel: 5.8.12-20-tkg-upds (x86_64), Desktop: Sway, Display Server: X Server 1.20.9 + Wayland, Display Driver: modesetting 1.20.9, OpenGL: 4.6 Mesa 20.1.8 (LLVM 10.0.1), Vulkan: 1.2.131, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: btrfs, Screen Resolution: 2560x1440
This test calculates the average frame-rate within the Superposition demo for the Unigine engine, released in 2017. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 4 October 2020 21:59 by user scrufulufugus.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: RADV_PERFTEST=aco MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 4 October 2020 22:55 by user scrufulufugus.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 4 October 2020 23:18 by user scrufulufugus.
Processor: Intel Core i9-7900X @ 4.50GHz (10 Cores / 20 Threads), Motherboard: ASUS PRIME X299-DELUXE (3105 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 1024GB INTEL SSDPEKNW010T8 + 256GB Western Digital WDS256G1X0C-00ENX0 + 4001GB Western Digital WD4004FZWX-0, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/1100MHz), Audio: Realtek ALC1220, Monitor: C27HG7x, Network: Intel I219-V + Intel I211 + Qualcomm Atheros QCA6174 802.11ac
OS: Arch rolling, Kernel: 5.8.12-20-tkg-upds (x86_64), Desktop: Sway, Display Server: X Server 1.20.9 + Wayland, Display Driver: modesetting 1.20.9, OpenGL: 4.6 Mesa 20.1.8 (LLVM 10.0.1), Vulkan: 1.2.131, Compiler: GCC 10.2.0 + Clang 10.0.1 + LLVM 10.0.1, File-System: btrfs, Screen Resolution: 2560x1440
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Environment Notes: MAKEFLAGS=-j20
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 4 October 2020 23:47 by user scrufulufugus.