blake2-test

2 x Intel Xeon E5620 testing with a Supermicro X8DTU (2.1b BIOS) and Matrox MGA G200eW WPCM450 on CentOS 6.10 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/1907309-HV-BLAKE2TES55.

blake2-testProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-Systemdefault2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads)Supermicro X8DTU (2.1b BIOS)Intel 5520 I/O + ICH10R12 x 8192 MB 800MHz Kingston299GB MR-USAS2Matrox MGA G200eW WPCM4504 x Intel 82576 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 16 x Intel 82599 Virtual FunctionCentOS 6.102.6.32-754.15.3.el6.x86_64 (x86_64)GCC 4.4.7 20120313ext4OpenBenchmarking.org- --build=x86_64-redhat-linux --disable-dssi --disable-libjava-multilib --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-unique-object --enable-java-awt=gtk --enable-java-maintainer-mode --enable-languages=c,c++,objc,obj-c++,java,fortran,ada --enable-libgcj-multifile --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-cloog --with-ppl --with-tune=generic - Scaling Governor: acpi-cpufreq performance- l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of Load fences + spectre_v2: Vulnerable: Retpoline with unsafe module(s) IBPB

blake2-testblake2: Standard Deviationdefault5.970.10%OpenBenchmarking.org

BLAKE2

OpenBenchmarking.orgCycles Per Byte, Fewer Is BetterBLAKE2 20170307default1.34332.68664.02995.37326.7165SE +/- 0.00, N = 35.971. (CC) gcc options: -O3 -march=native -lcrypto -lz


Phoronix Test Suite v10.8.4