2024-07-10-0148
2 x Intel Xeon E5-2680 v4 testing with a Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS) and Matrox MGA G200e [Pilot] on Arch Linux via the Phoronix Test Suite.
2 x Intel Xeon E5-2680 v4
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
CPU Temperature Monitor
System Temperature Monitor
Embree
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs (and GPUs via SYCL) and supporting instruction sets such as SSE, AVX, AVX2, and AVX-512. Embree also supports making use of the Intel SPMD Program Compiler (ISPC). Learn more via the OpenBenchmarking.org test page.
Binary: Pathtracer oneAPI SYCL - Model: Asian Dragon
2 x Intel Xeon E5-2680 v4: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: Error: No device of requested type available. -1 (PI_ERROR_DEVICE_NOT_FOUND)
Binary: Pathtracer oneAPI SYCL - Model: Asian Dragon Obj
2 x Intel Xeon E5-2680 v4: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: Error: No device of requested type available. -1 (PI_ERROR_DEVICE_NOT_FOUND)
Binary: Pathtracer oneAPI SYCL - Model: Crown
2 x Intel Xeon E5-2680 v4: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: Error: No device of requested type available. -1 (PI_ERROR_DEVICE_NOT_FOUND)
2 x Intel Xeon E5-2680 v4
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 July 2024 01:48 by user root.