proc

2 x AMD Opteron 6380 testing with a Supermicro H8DG6/H8DGi v1.0 (3.5c BIOS) and Matrox MGA G200eW WPCM450 2GB on Slackware 14.2 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2003057-SWAG-200305249.

procProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkAudioOSKernelDisplay ServerDisplay DriverOpenGLFile-SystemScreen ResolutionDesktopCompiler2 x Intel Xeon E5620optepr0n2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads)HP ProLiant DL360 G7 (P68 BIOS)Intel 5520 I/O + ICH104 x 4096 MB DDR3-1333MT/s500GB LOGICAL VOLUMEllvmpipe 16GBSME1920NR4 x Broadcom NetXtreme II BCM5709Fedora 315.3.7-301.fc31.x86_64 (x86_64)X Server 1.20.5modesetting 1.20.53.3 Mesa 19.2.0 (LLVM 9.0 128 bits)ext41280x10242 x AMD Opteron 6380 @ 2.50GHz (16 Cores / 32 Threads)Supermicro H8DG6/H8DGi v1.0 (3.5c BIOS)AMD RD890 + SB7x0/SB8x0/SB9x08 x 16384 MB DDR3-1600MHz4 x 1000GB Seagate ST1000DM010-2EP1 + 2 x 1024GB 1TB SATA SSDMatrox MGA G200eW WPCM450 2GBAMD Cape Verde/PitcairnASUS VP2472 x Intel 82576 + Intel 7265Slackware 14.25.4.23 (x86_64)XfceX Server 1.18.3radeon 7.7.0GCC 5.5.0 + Clang 3.8.0 + LLVM 3.8.01920x1080OpenBenchmarking.orgProcessor Details- 2 x Intel Xeon E5620: Scaling Governor: pcc-cpufreq performance - CPU Microcode: 0x1f- optepr0n: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x600084fSecurity Details- 2 x Intel Xeon E5620: SELinux + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling - optepr0n: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected

procy-cruncher: Calculating 500M Pi DigitsDifferenceStandard ErrorStandard Deviation2 x Intel Xeon E5620optepr0n126.7041.00x0.060.09%61.8791.51x2.9318.36%OpenBenchmarking.org

Y-Cruncher

Calculating 500M Pi Digits

OpenBenchmarking.orgSeconds, Fewer Is BetterY-Cruncher 0.7.8.9503Calculating 500M Pi Digits2 x Intel Xeon E5620optepr0n306090120150SE +/- 0.06, N = 3SE +/- 2.93, N = 15126.7061.88


Phoronix Test Suite v10.8.4