Intel Xeon X5647 Benchmarks
Various open-source benchmarks by the Phoronix Test Suite v8.8.1 (Hvaler).
NVIDIA Quadro 4000 - Intel Xeon X5647
Processor: Intel Xeon X5647 (4 Cores), Motherboard: Dell 06FW8P (A05 BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 24576MB, Disk: 1998GB PERC 6/i, Graphics: NVIDIA Quadro 4000 2GB, Audio: Intel 82801JI, Monitor: VP171b-2, Network: Broadcom NetXtreme BCM5761 PCIe
OS: Ubuntu 18.04, Kernel: 4.18.0-22-generic (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.1, Display Driver: modesetting 1.20.1, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
PSSTOP Memory test
Shows the total number of processes running and the memory they consume Learn more via the OpenBenchmarking.org test page.
NVIDIA Quadro 4000 - Intel Xeon X5647
Processor: Intel Xeon X5647 (4 Cores), Motherboard: Dell 06FW8P (A05 BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 24576MB, Disk: 1998GB PERC 6/i, Graphics: NVIDIA Quadro 4000 2GB, Audio: Intel 82801JI, Monitor: VP171b-2, Network: Broadcom NetXtreme BCM5761 PCIe
OS: Ubuntu 18.04, Kernel: 4.18.0-22-generic (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.1, Display Driver: modesetting 1.20.1, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1280x1024
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 20 June 2019 02:43 by user uu.