2 x Intel Xeon E5-2680 v4 testing with a Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS) and Matrox MGA G200e [Pilot] on Arch Linux via the Phoronix Test Suite.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Helsing is an open-source POSIX vampire number generator. This test profile measures the time it takes to generate vampire numbers between varying numbers of digits. Learn more via the OpenBenchmarking.org test page.
Helsing is an open-source POSIX vampire number generator. This test profile measures the time it takes to generate vampire numbers between varying numbers of digits. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 July 2024 08:44 by user root.