Intel Xeon E5-2686 v4 testing with a MACHINIST E5 MR9A PRO MAX (5.11 BIOS) and AMD Radeon RX 6600/6600 XT/6600M 10GB on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel Xeon E5-2686 v4 @ 3.00GHz (18 Cores / 36 Threads), Motherboard: MACHINIST E5 MR9A PRO MAX (5.11 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 250GB FIKWOT FS810 250 + 1024GB EDILOCA ES106 1T + 250GB Samsung SSD 840, Graphics: AMD Radeon RX 6600/6600 XT/6600M 10GB, Audio: Realtek ALC897, Monitor: HDMI, Network: Realtek RTL8111/8168/8211/8411
OS: Ubuntu 22.04, Kernel: 6.9.3-76060903-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.0.3-1pop1~1711635559~22.04~7a9f319 (LLVM 15.0.7 DRM 3.57), Vulkan: 1.3.274, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=1
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 8192 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2686 v4 @ 3.00GHz (18 Cores / 36 Threads), Motherboard: MACHINIST E5 MR9A PRO MAX (5.11 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 250GB FIKWOT FS810 250 + 1024GB EDILOCA ES106 1T + 250GB Samsung SSD 840, Graphics: AMD Radeon RX 6600/6600 XT/6600M 10GB, Audio: Realtek ALC897, Monitor: HDMI, Network: Realtek RTL8111/8168/8211/8411
OS: Ubuntu 22.04, Kernel: 6.9.3-76060903-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.0.3-1pop1~1711635559~22.04~7a9f319 (LLVM 15.0.7 DRM 3.57), Vulkan: 1.3.274, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DRI_PRIME=1
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0xb000040
Graphics Notes: BAR1 / Visible vRAM Size: 8192 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 28 October 2024 22:13 by user theopiens.