Various open-source benchmarks by the Phoronix Test Suite v10.8.5.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Learn more via the OpenBenchmarking.org test page.
NeatBench is a benchmark of the cross-platform Neat Video software on the CPU and optional GPU (OpenCL / CUDA) support. Learn more via the OpenBenchmarking.org test page.
An example test profile of handling pass/fail type testing rather than performance related. Learn more via the OpenBenchmarking.org test page.
This test measures the time to decompress a Linux kernel tarball using BZIP2. Learn more via the OpenBenchmarking.org test page.
This test uses systemd-analyze to report the userspace boot time. Learn more via the OpenBenchmarking.org test page.
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test run did not produce a result.
This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 13 October 2024 23:45 by user root.