2024-05-21-2056

Intel Xeon E5-2680 v4 testing with a MACHINIST X99 PR9 (5.11 BIOS) and NVIDIA GeForce 210 1GB on SystemRescue 10.01 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2405213-NE-20240521231&grs.

2024-05-21-2056ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerCompilerFile-SystemScreen ResolutionIntel Xeon E5-2680 v4Intel Xeon E5-2680 v4 @ 3.30GHz (14 Cores / 28 Threads)MACHINIST X99 PR9 (5.11 BIOS)Intel Xeon E7 v4/Xeon4 x 32 GB DDR4-2400MT/s Samsung M393A4K40BB1-CRC123GB SanDisk 3.2Gen1NVIDIA GeForce 210 1GBRealtek ALC897Realtek RTL8111/8168/8411SystemRescue 10.016.1.30-1-lts (x86_64)X Server 1.21.1.8GCC 13.1.1 20230429ext41920x1080OpenBenchmarking.org- Transparent Huge Pages: always- --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu - Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb00002e- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

2024-05-21-2056coremark: CoreMark Size 666 - Iterations Per SecondStandard ErrorStandard DeviationIntel Xeon E5-2680 v4388668.155583481.280.21%OpenBenchmarking.org

Coremark

CoreMark Size 666 - Iterations Per Second

OpenBenchmarking.orgIterations/Sec, More Is BetterCoremark 1.0CoreMark Size 666 - Iterations Per SecondIntel Xeon E5-2680 v480K160K240K320K400KSE +/- 481.28, N = 3388668.161. (CC) gcc options: -O2 -lrt" -lrt

Coremark

System Temperature Monitor

MinAvgMaxIntel Xeon E5-2680 v450.062.169.0OpenBenchmarking.orgCelsius, Fewer Is BetterCoremark 1.0System Temperature Monitor20406080100

Coremark

CPU Temperature Monitor

MinAvgMaxIntel Xeon E5-2680 v444.058.167.0OpenBenchmarking.orgCelsius, Fewer Is BetterCoremark 1.0CPU Temperature Monitor20406080100


Phoronix Test Suite v10.8.5