2 x Intel Xeon E5-2680 v4 testing with a Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS) and Matrox MGA G200e [Pilot] on Arch Linux via the Phoronix Test Suite.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Mozilla DeepSpeech is a speech-to-text engine powered by TensorFlow for machine learning and derived from Baidu's Deep Speech research paper. This test profile times the speech-to-text process for a roughly three minute audio recording. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB, Disk: 4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GB, Graphics: Matrox MGA G200e [Pilot], Monitor: S19C150, Network: 2 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbE
OS: Arch Linux, Kernel: 6.9.7-arch1-1 (x86_64), Compiler: GCC 14.1.1 20240522, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 9 July 2024 23:20 by user root.