Intel Xeon E5-1630 v4 testing with a LENOVO 102F (S00KT40A BIOS) and eVGA NVIDIA GeForce GT 710 1GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Xeon E5-1630 v4 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: LENOVO 102F (S00KT40A BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 180GB INTEL SSDSC2BF18, Graphics: eVGA NVIDIA GeForce GT 710 1GB, Audio: Realtek ALC662 rev3, Monitor: DELL 1708FP, Network: Intel I218-LM
OS: Ubuntu 20.04, Kernel: 5.11.0-34-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, Display Driver: NVIDIA 470.63.01, OpenGL: 4.6.0, OpenCL: OpenCL 3.0 CUDA 11.4.112, Vulkan: 1.2.175, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LIBGL_DRIVERS_PATH=/snap/alacritty/46/usr/lib/x86_64-linux-gnu/dri
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb00003e
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-1630 v4 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: LENOVO 102F (S00KT40A BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 180GB INTEL SSDSC2BF18, Graphics: eVGA NVIDIA GeForce GT 710 1GB, Audio: Realtek ALC662 rev3, Monitor: DELL 1708FP, Network: Intel I218-LM
OS: Ubuntu 20.04, Kernel: 5.11.0-34-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, Display Driver: NVIDIA 470.63.01, OpenGL: 4.6.0, OpenCL: OpenCL 3.0 CUDA 11.4.112, Vulkan: 1.2.175, Compiler: GCC 9.3.0, File-System: btrfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LIBGL_DRIVERS_PATH=/snap/alacritty/46/usr/lib/x86_64-linux-gnu/dri
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb00003e
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 19 September 2021 23:41 by user ar.