comet embree
Intel Core i7-10700T testing with a Logic Supply RXM-181 (Z01-0002A026 BIOS) and Intel UHD 630 CML GT2 3GB on Ubuntu 21.04 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
2
3
Processor: Intel Core i7-10700T @ 4.50GHz (8 Cores / 16 Threads), Motherboard: Logic Supply RXM-181 (Z01-0002A026 BIOS), Chipset: Intel Comet Lake PCH, Memory: 32GB, Disk: 256GB TS256GMTS800, Graphics: Intel UHD 630 CML GT2 3GB (1200MHz), Audio: Realtek ALC233, Monitor: DELL P2415Q, Network: Intel I219-LM + Intel I210
OS: Ubuntu 21.04, Kernel: 5.11.0-16-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 21.0.1, Vulkan: 1.2.145, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Embree
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs and supporting instruction sets such as SSE, AVX, AVX2, and AVX-512. Embree also supports making use of the Intel SPMD Program Compiler (ISPC). Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2021 17:01 by user phoronix.
2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2021 17:52 by user phoronix.
3
Processor: Intel Core i7-10700T @ 4.50GHz (8 Cores / 16 Threads), Motherboard: Logic Supply RXM-181 (Z01-0002A026 BIOS), Chipset: Intel Comet Lake PCH, Memory: 32GB, Disk: 256GB TS256GMTS800, Graphics: Intel UHD 630 CML GT2 3GB (1200MHz), Audio: Realtek ALC233, Monitor: DELL P2415Q, Network: Intel I219-LM + Intel I210
OS: Ubuntu 21.04, Kernel: 5.11.0-16-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 21.0.1, Vulkan: 1.2.145, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0 - Thermald 2.4.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 8 May 2021 18:01 by user phoronix.