Intel Core i9-7980XE testing with a ASRock X299 Professional Gaming i9 (P2.30B BIOS) and AMD Radeon RX 7800 XT 16GB on openSUSE 20240607 via the Phoronix Test Suite.
Processor: Intel Core i9-7980XE @ 4.60GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Professional Gaming i9 (P2.30B BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 2048GB J.ZAO KP 2TB SSD + 500GB Western Digital WDS500G2B0C-00PXH0, Graphics: AMD Radeon RX 7800 XT 16GB, Audio: Realtek ALC1220, Monitor: U28H75x, Network: Intel I219-V + Intel I211 + Aquantia AQtion AQC107 NBase-T/IEEE + Intel Dual Band-AC 3168NGW
OS: openSUSE 20240607, Kernel: 6.10.0-rc2-1.g068a181-default (x86_64), Desktop: KDE Plasma 6.0.5, Display Server: X Server 1.21.1.12 + Wayland, OpenGL: 4.6 Mesa 24.1.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3614.0), File-System: btrfs, Screen Resolution: 7680x2160
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2007006
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i9-7980XE @ 4.60GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Professional Gaming i9 (P2.30B BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 2048GB J.ZAO KP 2TB SSD + 500GB Western Digital WDS500G2B0C-00PXH0, Graphics: AMD Radeon RX 7800 XT 16GB, Audio: Realtek ALC1220, Monitor: U28H75x, Network: Intel I219-V + Intel I211 + Aquantia AQtion AQC107 NBase-T/IEEE + Intel Dual Band-AC 3168NGW
OS: openSUSE 20240607, Kernel: 6.10.0-rc2-1.g068a181-default (x86_64), Desktop: KDE Plasma 6.0.5, Display Server: X Server 1.21.1.12 + Wayland, OpenGL: 4.6 Mesa 24.1.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3614.0), File-System: btrfs, Screen Resolution: 7680x2160
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2007006
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Vulnerable + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 8 June 2024 12:37 by user xchgeaxeax.