Run3

2 x Intel Xeon E5-2699 v4 testing with a Intel GRANTLEY (GRRFCRB1.86B.0279.D12.2402230824 BIOS) and llvmpipe on Red Hat Enterprise Linux 9.2 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2403170-NE-RUN35204170.

Run3ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionADATA SU6302 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads)Intel GRANTLEY (GRRFCRB1.86B.0279.D12.2402230824 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-1200MT/s480GB ADATA SU630llvmpipe2 x Intel 10-Gigabit X540-AT2Red Hat Enterprise Linux 9.26.6.9 (x86_64)GNOME Shell 40.10X Server + Wayland4.5 Mesa 22.3.0 (LLVM 15.0.7 256 bits)GCC 11.3.1 20221121ext41024x768OpenBenchmarking.org- Transparent Huge Pages: always- MQ-DEADLINE / relatime,rw,seclabel / Block Size: 4096- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000041- Python 3.9.18- SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Run3compilebench: Read Compiled TreeStandard ErrorStandard DeviationADATA SU630658.620.820.22%OpenBenchmarking.org

Compile Bench

Test: Read Compiled Tree

OpenBenchmarking.orgMB/s, More Is BetterCompile Bench 0.6Test: Read Compiled TreeADATA SU630140280420560700SE +/- 0.82, N = 3658.62


Phoronix Test Suite v10.8.4