fluidx-tril
2 x AMD EPYC 9174F 16-Core testing with a ASUS RS700A-E12-RS4U K14PP-D24 (1002 BIOS) and llvmpipe on Ubuntu 20.04 via the Phoronix Test Suite.
llvmpipe
Processor: 2 x AMD EPYC 9174F 16-Core @ 4.10GHz (32 Cores / 63 Threads), Motherboard: ASUS RS700A-E12-RS4U K14PP-D24 (1002 BIOS), Chipset: AMD Device 14a4, Memory: 24 x 32 GB 4800MT/s Samsung M321R4GA3BB6-CQKEG, Disk: 500GB CT500P3PSSD8 + 3841GB DAPUSTOR DPH311T4T003T8 + 960GB HUSMR7696BDP3Y1, Graphics: llvmpipe, Monitor: ACER KA220HQ, Network: 2 x Intel X710 for 10GBASE-T + 2 x Intel X710 for 10GbE SFP+
OS: Ubuntu 20.04, Kernel: 5.15.0-91-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Display Driver: NVIDIA 535.154.05, OpenGL: 4.5 Mesa 21.2.6 (LLVM 12.0.0 256 bits), OpenCL: OpenCL 3.0 CUDA 12.2.148, Vulkan: 1.3.242, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa10113e
Graphics Notes: BAR1 / Visible vRAM Size: 65536 MiB - vBIOS Version: 95.02.66.00.02
OpenCL Notes: GPU Compute Cores: 18176
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
FluidX3D
FluidX3D is a speedy and memory efficient Boltzmann CFD (Computational Fluid Dynamics) software package implemented using OpenCL and intended for GPU acceleration. FluidX3D is developed by Moritz Lehmann and written free for non-commercial use. This is a test profile measuring the system OpenCL performance using the FluidX3D benchmark. Learn more via the OpenBenchmarking.org test page.
llvmpipe
Processor: 2 x AMD EPYC 9174F 16-Core @ 4.10GHz (32 Cores / 63 Threads), Motherboard: ASUS RS700A-E12-RS4U K14PP-D24 (1002 BIOS), Chipset: AMD Device 14a4, Memory: 24 x 32 GB 4800MT/s Samsung M321R4GA3BB6-CQKEG, Disk: 500GB CT500P3PSSD8 + 3841GB DAPUSTOR DPH311T4T003T8 + 960GB HUSMR7696BDP3Y1, Graphics: llvmpipe, Monitor: ACER KA220HQ, Network: 2 x Intel X710 for 10GBASE-T + 2 x Intel X710 for 10GbE SFP+
OS: Ubuntu 20.04, Kernel: 5.15.0-91-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Display Driver: NVIDIA 535.154.05, OpenGL: 4.5 Mesa 21.2.6 (LLVM 12.0.0 256 bits), OpenCL: OpenCL 3.0 CUDA 12.2.148, Vulkan: 1.3.242, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa10113e
Graphics Notes: BAR1 / Visible vRAM Size: 65536 MiB - vBIOS Version: 95.02.66.00.02
OpenCL Notes: GPU Compute Cores: 18176
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 February 2024 11:05 by user root.