vkpeak quadro
Intel Xeon E-2288G testing with a Compulab SBC-ATCFL v1.2 (ATOP3.PRD.0.29.2 BIOS) and NVIDIA Quadro RTX 4000 8GB on Ubuntu 20.10 via the Phoronix Test Suite.
1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Mitigation of TSX disabled
2
3
4
Processor: Intel Xeon E-2288G @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Compulab SBC-ATCFL v1.2 (ATOP3.PRD.0.29.2 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 64GB, Disk: Samsung SSD 970 EVO Plus 250GB, Graphics: NVIDIA Quadro RTX 4000 8GB (1005/6500MHz), Audio: Intel Cannon Lake PCH cAVS, Network: Intel I219-LM + Intel I210
OS: Ubuntu 20.10, Kernel: 5.8.0-41-generic (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.2.109, Vulkan: 1.2.155, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1920x1080
vkpeak
Vkpeak is a Vulkan compute benchmark inspired by OpenCL's clpeak. Vkpeak provides Vulkan compute performance measurements for FP16 / FP32 / FP64 / INT16 / INT32 scalar and vec4 performance. Learn more via the OpenBenchmarking.org test page.
1
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 24 April 2021 11:56 by user phoronix.
2
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 24 April 2021 12:27 by user phoronix.
3
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 24 April 2021 12:38 by user phoronix.
4
Processor: Intel Xeon E-2288G @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Compulab SBC-ATCFL v1.2 (ATOP3.PRD.0.29.2 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 64GB, Disk: Samsung SSD 970 EVO Plus 250GB, Graphics: NVIDIA Quadro RTX 4000 8GB (1005/6500MHz), Audio: Intel Cannon Lake PCH cAVS, Network: Intel I219-LM + Intel I210
OS: Ubuntu 20.10, Kernel: 5.8.0-41-generic (x86_64), Desktop: GNOME Shell 3.38.2, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, OpenGL: 4.6.0, OpenCL: OpenCL 1.2 CUDA 11.2.109, Vulkan: 1.2.155, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Mitigation of TSX disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 24 April 2021 12:57 by user phoronix.