Intel Core i9-10980XE testing with a ASUS PRIME X299-A (3301 BIOS) and AMD Radeon Pro VII/Radeon Inst t MI50 32GB 16GB on openSUSE 20240423 via the Phoronix Test Suite.
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASUS PRIME X299-A (3301 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 128GB, Disk: 4001GB Corsair Force MP510 + 8002GB Samsung SSD 870 + 2 x 6001GB Seagate ST6000VX001-2BD1 + 2 x 2000GB Western Digital WD20EFRX-68A + 6001GB Western Digital WD60EFAX-68J + 250GB Samsung SSD 840 + 500GB Samsung SSD 850 + 2000GB Seagate BarraCud + 0GB USB3.0 CRW-0 + 0GB USB3.0 CRW-1 + 0GB USB3.0 CRW-2 + 0GB USB3.0 CRW-3, Graphics: AMD Radeon Pro VII/Radeon Inst t MI50 32GB 16GB, Audio: Realtek ALC1220, Monitor: HP Z27n G2, Network: Intel I219-V
OS: openSUSE 20240423, Kernel: 6.8.7-1-default (x86_64), Desktop: KDE Plasma 6.0.4, Display Server: X Server 1.21.1.12 + Wayland, OpenGL: 4.6 Mesa 24.0.3 (LLVM 18.1.3 DRM 3.57), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23] + Clang 18.1.4 + LLVM 18.1.4, File-System: tmpfs, Screen Resolution: 2560x1440
Kernel Notes: nvme_core.default_ps_max_latency_us=0 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x5003605
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Vulnerable; BHI: Vulnerable + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Vkpeak is a Vulkan compute benchmark inspired by OpenCL's clpeak. Vkpeak provides Vulkan compute performance measurements for FP16 / FP32 / FP64 / INT16 / INT32 scalar and vec4 performance. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASUS PRIME X299-A (3301 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 128GB, Disk: 4001GB Corsair Force MP510 + 8002GB Samsung SSD 870 + 2 x 6001GB Seagate ST6000VX001-2BD1 + 2 x 2000GB Western Digital WD20EFRX-68A + 6001GB Western Digital WD60EFAX-68J + 250GB Samsung SSD 840 + 500GB Samsung SSD 850 + 2000GB Seagate BarraCud + 0GB USB3.0 CRW-0 + 0GB USB3.0 CRW-1 + 0GB USB3.0 CRW-2 + 0GB USB3.0 CRW-3, Graphics: AMD Radeon Pro VII/Radeon Inst t MI50 32GB 16GB, Audio: Realtek ALC1220, Monitor: HP Z27n G2, Network: Intel I219-V
OS: openSUSE 20240423, Kernel: 6.8.7-1-default (x86_64), Desktop: KDE Plasma 6.0.4, Display Server: X Server 1.21.1.12 + Wayland, OpenGL: 4.6 Mesa 24.0.3 (LLVM 18.1.3 DRM 3.57), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23] + Clang 18.1.4 + LLVM 18.1.4, File-System: tmpfs, Screen Resolution: 2560x1440
Kernel Notes: nvme_core.default_ps_max_latency_us=0 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x5003605
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Vulnerable; BHI: Vulnerable + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 27 April 2024 08:23 by user jacob.