Intel Core i7-6700K testing with a ASUS H170 PRO GAMING (3805 BIOS) and eVGA NVIDIA GeForce RTX 2080 8GB on Linuxmint 21.3
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS H170 PRO GAMING (3805 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32GB, Disk: 2000GB CT2000P3SSD8 + 1000GB CT1000P3SSD8 + 1000GB Seagate ST1000DM010-2EP1 + 480GB KINGSTON SA400S3 + 500GB SAMSUNG HD501LJ + 1000GB Seagate ST1000DM003-1SB1 + 2000GB Seagate ST2000DM008-2FR1 + 0GB DataTraveler 3.0 + 4001GB 024-2AN17V + 4001GB EXTERNAL_USB, Graphics: eVGA NVIDIA GeForce RTX 2080 8GB, Audio: Realtek ALC1150, Monitor: SAMSUNG, Network: Intel I219-V
OS: Linuxmint 21.3, Kernel: 6.5.0-1004-NVIDIA (x86_64), Desktop: Cinnamon 6.0.4, Display Server: X Server 1.21.1.4, Display Driver: NVIDIA 535.161.07, OpenGL: 4.6.0, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles performance with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported as well as HIP for AMD Radeon GPUs and Intel oneAPI for Intel Graphics. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS H170 PRO GAMING (3805 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 32GB, Disk: 2000GB CT2000P3SSD8 + 1000GB CT1000P3SSD8 + 1000GB Seagate ST1000DM010-2EP1 + 480GB KINGSTON SA400S3 + 500GB SAMSUNG HD501LJ + 1000GB Seagate ST1000DM003-1SB1 + 2000GB Seagate ST2000DM008-2FR1 + 0GB DataTraveler 3.0 + 4001GB 024-2AN17V + 4001GB EXTERNAL_USB, Graphics: eVGA NVIDIA GeForce RTX 2080 8GB, Audio: Realtek ALC1150, Monitor: SAMSUNG, Network: Intel I219-V
OS: Linuxmint 21.3, Kernel: 6.5.0-1004-NVIDIA (x86_64), Desktop: Cinnamon 6.0.4, Display Server: X Server 1.21.1.4, Display Driver: NVIDIA 535.161.07, OpenGL: 4.6.0, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 14 March 2024 12:47 by user santonv.