2 x Intel Xeon E5-2680 v4 testing with a Intel S2600CWR (SE5C610.86B.01.01.0028.121720182203 BIOS) and Matrox MGA G200e [Pilot] on SystemRescue 10.01 via the Phoronix Test Suite.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CWR (SE5C610.86B.01.01.0028.121720182203 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 32 GB DDR4-2134MT/s Samsung M393A4K40BB0-CPB, Disk: 4 x 2000GB Seagate ST2000DM008-2UB1 + 3 x 480GB KINGSTON SA400S3 + 2 x 480GB TEAM T253480GB + 3001GB Seagate ST3000DM001-1CH1 + 123GB SanDisk 3.2Gen1, Graphics: Matrox MGA G200e [Pilot], Network: 2 x Intel I350
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Python Notes: Python 3.11.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This is a benchmark of the FFmpeg multimedia framework. The FFmpeg test profile is making use of a modified version of vbench from Columbia University's Architecture and Design Lab (ARCADE) [http://arcade.cs.columbia.edu/vbench/] that is a benchmark for video-as-a-service workloads. The test profile offers the options of a range of vbench scenarios based on freely distributable video content and offers the options of using the x264 or x265 video encoders for transcoding. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CWR (SE5C610.86B.01.01.0028.121720182203 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 32 GB DDR4-2134MT/s Samsung M393A4K40BB0-CPB, Disk: 4 x 2000GB Seagate ST2000DM008-2UB1 + 3 x 480GB KINGSTON SA400S3 + 2 x 480GB TEAM T253480GB + 3001GB Seagate ST3000DM001-1CH1 + 123GB SanDisk 3.2Gen1, Graphics: Matrox MGA G200e [Pilot], Network: 2 x Intel I350
OS: SystemRescue 10.01, Kernel: 6.1.30-1-lts (x86_64), Display Server: X Server 1.21.1.8, Compiler: GCC 13.1.1 20230429, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Python Notes: Python 3.11.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 February 2024 15:52 by user root.