Run3
2 x Intel Xeon E5-2699 v4 testing with a Intel GRANTLEY (GRRFCRB1.86B.0279.D12.2402230824 BIOS) and llvmpipe on Red Hat Enterprise Linux 9.2 via the Phoronix Test Suite.
ADATA SU630
Processor: 2 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads), Motherboard: Intel GRANTLEY (GRRFCRB1.86B.0279.D12.2402230824 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-1200MT/s, Disk: 480GB ADATA SU630, Graphics: llvmpipe, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Red Hat Enterprise Linux 9.2, Kernel: 6.6.9 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.3.0 (LLVM 15.0.7 256 bits), Compiler: GCC 11.3.1 20221121, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / relatime,rw,seclabel / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000041
Python Notes: Python 3.9.18
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
ADATA SU630
Processor: 2 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads), Motherboard: Intel GRANTLEY (GRRFCRB1.86B.0279.D12.2402230824 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-1200MT/s, Disk: 480GB ADATA SU630, Graphics: llvmpipe, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Red Hat Enterprise Linux 9.2, Kernel: 6.6.9 (x86_64), Desktop: GNOME Shell 40.10, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.3.0 (LLVM 15.0.7 256 bits), Compiler: GCC 11.3.1 20221121, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / relatime,rw,seclabel / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000041
Python Notes: Python 3.9.18
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 16 March 2024 17:13 by user root.