secTest
Processor: 2 x Intel Xeon E5-2697 v2 @ 3.50GHz (24 Cores / 48 Threads), Motherboard: Dell 0C4Y3R (2.9.0 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 192GB, Disk: 2 x 4000GB PERC H710P + 12001GB PERC H710P + 2000GB PERC H710P + 1000GB PERC H710P + 1024GB RTL9210B-CG + 2000GB + 62GB Ultra + 4001GB Expansion Desk, Graphics: llvmpipe (772/3004MHz), Audio: C-Media CMI8738/CMI8768, Monitor: C27F390, Network: 4 x Intel I350 + Mellanox MT27500
OS: openSUSE 20241018, Kernel: 6.11.4-1.g1f17917-default (x86_64), Desktop: KDE Plasma 6.2.1, Display Server: X Server 1.21.1.12, Display Driver: NVIDIA 560.35.03, OpenGL: 4.5 Mesa 24.1.7 (LLVM 18.1.8 256 bits), Compiler: PGI Compiler + Clang 17.0.6 + CUDA 12.6, File-System: xfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: always
Environment Notes: CUDBG_USE_LEGACY_DEBUGGER=1
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x42e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
SecureMark is an objective, standardized benchmarking framework for measuring the efficiency of cryptographic processing solutions developed by EEMBC. SecureMark-TLS is benchmarking Transport Layer Security performance with a focus on IoT/edge computing. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2697 v2 @ 3.50GHz (24 Cores / 48 Threads), Motherboard: Dell 0C4Y3R (2.9.0 BIOS), Chipset: Intel Xeon E7 v2/Xeon, Memory: 192GB, Disk: 2 x 4000GB PERC H710P + 12001GB PERC H710P + 2000GB PERC H710P + 1000GB PERC H710P + 1024GB RTL9210B-CG + 2000GB + 62GB Ultra + 4001GB Expansion Desk, Graphics: llvmpipe (772/3004MHz), Audio: C-Media CMI8738/CMI8768, Monitor: C27F390, Network: 4 x Intel I350 + Mellanox MT27500
OS: openSUSE 20241018, Kernel: 6.11.4-1.g1f17917-default (x86_64), Desktop: KDE Plasma 6.2.1, Display Server: X Server 1.21.1.12, Display Driver: NVIDIA 560.35.03, OpenGL: 4.5 Mesa 24.1.7 (LLVM 18.1.8 256 bits), Compiler: PGI Compiler + Clang 17.0.6 + CUDA 12.6, File-System: xfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: always
Environment Notes: CUDBG_USE_LEGACY_DEBUGGER=1
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x42e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 October 2024 14:05 by user franz.