Intel Xeon E5-2620 0 testing with a American Megatrends 4.6.5 and NVIDIA Quadro 600 1GB on Arch Linux via the Phoronix Test Suite.
Processor: Intel Xeon E5-2620 0 @ 2.50GHz (6 Cores / 12 Threads), Motherboard: American Megatrends 4.6.5, Chipset: Intel Xeon E5/Core, Memory: 16GB, Disk: 1000GB PNY CS3030 1TB SSD, Graphics: NVIDIA Quadro 600 1GB, Audio: NVIDIA GF108 HD Audio, Monitor: SMB2240W, Network: Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 5.8.10-arch1-1 (x86_64), Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1680x1050
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x710
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
AOBench is a lightweight ambient occlusion renderer, written in C. The test profile is using a size of 2048 x 2048. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2620 0 @ 2.50GHz (6 Cores / 12 Threads), Motherboard: American Megatrends 4.6.5, Chipset: Intel Xeon E5/Core, Memory: 16GB, Disk: 1000GB PNY CS3030 1TB SSD, Graphics: NVIDIA Quadro 600 1GB, Audio: NVIDIA GF108 HD Audio, Monitor: SMB2240W, Network: Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 5.8.10-arch1-1 (x86_64), Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1680x1050
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x710
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 September 2020 15:12 by user emil.