Various open-source benchmarks by the Phoronix Test Suite v10.8.5.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs (and GPUs via SYCL) and supporting instruction sets such as SSE, AVX, AVX2, and AVX-512. Embree also supports making use of the Intel SPMD Program Compiler (ISPC). Learn more via the OpenBenchmarking.org test page.
Binary: Pathtracer - Model: Asian Dragon
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./bin/embree_pathtracer: error while loading shared libraries: libOpenGL.so.0: cannot open shared object file: No such file or directory
Test: mistral-7b-instruct-v0.2.Q5_K_M - Acceleration: CPU
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./run-mistral: line 2: ./mistral-7b-instruct-v0.2.Q5_K_M.llamafile.86: No such file or directory
Test: mistral-7b-instruct-v0.2.Q5_K_M - Acceleration: GPU AUTO
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ./run-mistral: line 2: ./mistral-7b-instruct-v0.2.Q5_K_M.llamafile.86: No such file or directory
This test is a quick-running survey of general R performance Learn more via the OpenBenchmarking.org test page.
SAMSUNG MZ7KM480 - 2 x Intel Xeon Gold 6144: The test quit with a non-zero exit status. E: ERROR: Rscript is not found on the system!
This test measures how long it takes to extract the .tar.xz Linux kernel source tree package. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Dell PowerEdge R640 0W23H8 (2.21.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFD, Graphics: Matrox G200eW3, Network: 4 x Intel X550 + 4 x Intel I350
OS: Debian GNU/Linux 12, Kernel: 6.8.12-2-pve (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Disk Notes: MQ-DEADLINE / errors=remount-ro,relatime,rw / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 October 2024 00:13 by user root.