2023-04-19-1655
2 x Intel Xeon E5-2680 v2 testing with a Supermicro X9DRW v0123456789 (3.3 BIOS) and Matrox G200eR2 on Arch Linux via the Phoronix Test Suite.
2023-04-19 16:55
Processor: 2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.3 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 16 GB + 8 GB + 16 GB + 8 GB + 8 GB + 8 GB + 8 GB + 8 GB + 16 GB + 16 GB DDR3-1333MT/s, Disk: 120GB KINGSTON SA400S3, Graphics: Matrox G200eR2, Network: 2 x Intel I350
OS: Arch Linux, Kernel: 6.2.11-arch1-1 (x86_64), Compiler: GCC 12.2.1 20230201, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x42d
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
pmbench
Pmbench is a Linux paging and virtual memory benchmark. This test profile will report the average page latency of the system. Learn more via the OpenBenchmarking.org test page.
System Temperature Monitor
CPU Temperature Monitor
2023-04-19 16:55
Processor: 2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads), Motherboard: Supermicro X9DRW v0123456789 (3.3 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 16 GB + 8 GB + 16 GB + 8 GB + 8 GB + 8 GB + 8 GB + 8 GB + 16 GB + 16 GB DDR3-1333MT/s, Disk: 120GB KINGSTON SA400S3, Graphics: Matrox G200eR2, Network: 2 x Intel I350
OS: Arch Linux, Kernel: 6.2.11-arch1-1 (x86_64), Compiler: GCC 12.2.1 20230201, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x42d
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 April 2023 16:55 by user root.