rocky8
Intel Core i7-7800X testing with a ASUS WS X299 SAGE (3405 BIOS) and llvmpipe on Rocky Linux 8.6 via the Phoronix Test Suite.
7800x
Processor: Intel Core i7-7800X @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASUS WS X299 SAGE (3405 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 64GB, Disk: 1000GB CT1000MX500SSD1 + 4001GB Seagate ST4000NM0035-1V4, Graphics: llvmpipe, Audio: Realtek ALC1220, Network: Intel I219-LM + Intel I210
OS: Rocky Linux 8.6, Kernel: 4.18.0-372.19.1.el8_6.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server 1.20.11, Display Driver: NVIDIA, OpenGL: 4.5 Mesa 21.3.4 (LLVM 13.0.1 256 bits), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 4520x1920
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x2006d05
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
SVT-AV1
NAMD CUDA
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. This version of the NAMD test profile uses CUDA GPU acceleration. Learn more via the OpenBenchmarking.org test page.
Hashcat
Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.
7800x
Processor: Intel Core i7-7800X @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASUS WS X299 SAGE (3405 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 64GB, Disk: 1000GB CT1000MX500SSD1 + 4001GB Seagate ST4000NM0035-1V4, Graphics: llvmpipe, Audio: Realtek ALC1220, Network: Intel I219-LM + Intel I210
OS: Rocky Linux 8.6, Kernel: 4.18.0-372.19.1.el8_6.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server 1.20.11, Display Driver: NVIDIA, OpenGL: 4.5 Mesa 21.3.4 (LLVM 13.0.1 256 bits), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 4520x1920
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x2006d05
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 September 2022 16:41 by user asalois.