Various open-source benchmarks by the Phoronix Test Suite v10.8.5.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
This test is a quick-running survey of general R performance Learn more via the OpenBenchmarking.org test page.
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ERROR: Rscript is not found on the system!
Test: mistral-7b-instruct-v0.2.Q5_K_M - Acceleration: CPU
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./run-mistral: line 2: ./mistral-7b-instruct-v0.2.Q5_K_M.llamafile.86: No such file or directory
Test: mistral-7b-instruct-v0.2.Q5_K_M - Acceleration: GPU AUTO
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./run-mistral: line 2: ./mistral-7b-instruct-v0.2.Q5_K_M.llamafile.86: No such file or directory
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs (and GPUs via SYCL) and supporting instruction sets such as SSE, AVX, AVX2, and AVX-512. Embree also supports making use of the Intel SPMD Program Compiler (ISPC). Learn more via the OpenBenchmarking.org test page.
Binary: Pathtracer - Model: Asian Dragon
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./bin/embree_pathtracer: error while loading shared libraries: libOpenGL.so.0: cannot open shared object file: No such file or directory
This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 October 2024 00:13 by user root.