10980XE Blender 2.92
Intel Core i9-10980XE testing with a ASRock X299 Steel Legend (P1.30 BIOS) and llvmpipe on Ubuntu 20.04 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
2
3
4
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: Samsung SSD 970 PRO 512GB, Graphics: llvmpipe, Audio: Realtek ALC1220, Network: Intel I219-V + Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.0-rc2-phx (x86_64) 20210109, Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 3.3 Mesa 20.0.8 (LLVM 10.0.0 256 bits), Compiler: GCC 9.3.0 + CUDA 11.1, File-System: ext4, Screen Resolution: 1024x768
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL, NVIDIA OptiX, and NVIDIA CUDA is supported. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 26 February 2021 10:36 by user pts.
2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 26 February 2021 11:40 by user pts.
3
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 26 February 2021 13:02 by user pts.
4
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: Samsung SSD 970 PRO 512GB, Graphics: llvmpipe, Audio: Realtek ALC1220, Network: Intel I219-V + Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.0-rc2-phx (x86_64) 20210109, Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 3.3 Mesa 20.0.8 (LLVM 10.0.0 256 bits), Compiler: GCC 9.3.0 + CUDA 11.1, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 26 February 2021 14:06 by user pts.