benchmark-cg2300-pts-stockfish

2 x Intel Xeon E5-2658 v4 testing with a Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS) and Matrox MGA G200e [Pilot] on Rocky Linux 8.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409076-NE-BENCHMARK96
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x Intel Xeon E5-2658 v4
September 06
  2 Hours, 46 Minutes


benchmark-cg2300-pts-stockfishOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2658 v4 @ 2.30GHz (28 Cores / 56 Threads)Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-2400MT/s Micron 18ASF2G72PDZ-2G3B11199GB RS3YCMatrox MGA G200e [Pilot]6 x Intel I350 + 4 x Intel X710 for 10GbE SFP+ + 2 x Intel X550 + 8 x Intel X550 Virtual FunctionRocky Linux 8.104.18.0-553.8.1.el8_10.x86_64 (x86_64)GCC 8.5.0 20210514xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionBenchmark-cg2300-pts-stockfish PerformanceSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000017- SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

Stockfish

This is a test of Stockfish, an advanced open-source C++11 chess benchmark that can scale up to 1024 CPU threads. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgNodes Per Second, More Is BetterStockfish 16.1Chess Benchmark2 x Intel Xeon E5-2658 v4800K1600K2400K3200K4000KSE +/- 171507.55, N = 73633643