e5-2699v4-dual-asmfish-benchmark-2024-03-25

2 x Intel Xeon E5-2699 v4 testing with a Supermicro X10DRL-i v1.01 (2.0_NIC BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2403255-NE-E52699V4D51.

e5-2699v4-dual-asmfish-benchmark-2024-03-25ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDisplay ServerVulkanCompilerFile-SystemScreen Resolution2 x Intel Xeon E5-2699 v42 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads)Supermicro X10DRL-i v1.01 (2.0_NIC BIOS)Intel Xeon E7 v4/Xeon128GB128GB SAMSUNG SSD SM84ASPEEDULTRON 2435V2 x Intel I210Ubuntu 20.045.15.0-101-generic (x86_64)X Server 1.20.131.1.182GCC 9.4.0ext41920x1080OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

e5-2699v4-dual-asmfish-benchmark-2024-03-25asmfish: 1024 Hash Memory, 26 DepthStandard ErrorStandard Deviation2 x Intel Xeon E5-2699 v4861834851106687.202.22%OpenBenchmarking.org

asmFish

1024 Hash Memory, 26 Depth

OpenBenchmarking.orgNodes/second, More Is BetterasmFish 2018-07-231024 Hash Memory, 26 Depth2 x Intel Xeon E5-2699 v420M40M60M80M100MSE +/- 1106687.20, N = 386183485


Phoronix Test Suite v10.8.4