core i9 10980XE mlc test run
Intel Core i9-10980XE testing with a ASRock X299 Steel Legend (P1.30 BIOS) and NVIDIA NV132 11GB on Ubuntu 21.04 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
2
3
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 8 GB DDR4-3600MT/s, Disk: Samsung SSD 970 PRO 512GB, Graphics: NVIDIA NV132 11GB, Audio: Realtek ALC1220, Monitor: ASUS VP28U, Network: Intel I219-V + Intel I211
OS: Ubuntu 21.04, Kernel: 5.11.0-16-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server, Display Driver: nouveau, OpenGL: 4.3 Mesa 21.0.1, Vulkan: 1.0.2, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 2560x1600
Intel Memory Latency Checker
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 22 April 2021 17:28 by user root.
2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 22 April 2021 17:45 by user root.
3
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 8 GB DDR4-3600MT/s, Disk: Samsung SSD 970 PRO 512GB, Graphics: NVIDIA NV132 11GB, Audio: Realtek ALC1220, Monitor: ASUS VP28U, Network: Intel I219-V + Intel I211
OS: Ubuntu 21.04, Kernel: 5.11.0-16-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server, Display Driver: nouveau, OpenGL: 4.3 Mesa 21.0.1, Vulkan: 1.0.2, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 2560x1600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003003
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 22 April 2021 17:57 by user root.