blake2-test
2 x Intel Xeon E5620 testing with a Supermicro X8DTU (2.1b BIOS) and Matrox MGA G200eW WPCM450 on CentOS 6.10 via the Phoronix Test Suite.
default
Processor: 2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads), Motherboard: Supermicro X8DTU (2.1b BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 12 x 8192 MB 800MHz Kingston, Disk: 299GB MR-USAS2, Graphics: Matrox MGA G200eW WPCM450, Network: 4 x Intel 82576 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 16 x Intel 82599 Virtual Function
OS: CentOS 6.10, Kernel: 2.6.32-754.15.3.el6.x86_64 (x86_64), Compiler: GCC 4.4.7 20120313, File-System: ext4
Compiler Notes: --build=x86_64-redhat-linux --disable-dssi --disable-libjava-multilib --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-unique-object --enable-java-awt=gtk --enable-java-maintainer-mode --enable-languages=c,c++,objc,obj-c++,java,fortran,ada --enable-libgcj-multifile --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-cloog --with-ppl --with-tune=generic
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of Load fences + spectre_v2: Vulnerable: Retpoline with unsafe module(s) IBPB
BLAKE2
This is a benchmark of BLAKE2 using the blake2s binary. BLAKE2 is a high-performance crypto alternative to MD5 and SHA-2/3. Learn more via the OpenBenchmarking.org test page.
default
Processor: 2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads), Motherboard: Supermicro X8DTU (2.1b BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 12 x 8192 MB 800MHz Kingston, Disk: 299GB MR-USAS2, Graphics: Matrox MGA G200eW WPCM450, Network: 4 x Intel 82576 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 16 x Intel 82599 Virtual Function
OS: CentOS 6.10, Kernel: 2.6.32-754.15.3.el6.x86_64 (x86_64), Compiler: GCC 4.4.7 20120313, File-System: ext4
Compiler Notes: --build=x86_64-redhat-linux --disable-dssi --disable-libjava-multilib --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-unique-object --enable-java-awt=gtk --enable-java-maintainer-mode --enable-languages=c,c++,objc,obj-c++,java,fortran,ada --enable-libgcj-multifile --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-cloog --with-ppl --with-tune=generic
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of Load fences + spectre_v2: Vulnerable: Retpoline with unsafe module(s) IBPB
Testing initiated at 30 July 2019 06:23 by user .