proc 2 x AMD Opteron 6380 testing with a Supermicro H8DG6/H8DGi v1.0 (3.5c BIOS) and Matrox MGA G200eW WPCM450 2GB on Slackware 14.2 via the Phoronix Test Suite.
HTML result view exported from: https://openbenchmarking.org/result/2003057-SWAG-200305249 .
proc Processor Motherboard Chipset Memory Disk Graphics Monitor Network Audio OS Kernel Display Server Display Driver OpenGL File-System Screen Resolution Desktop Compiler 2 x Intel Xeon E5620 optepr0n 2 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads) HP ProLiant DL360 G7 (P68 BIOS) Intel 5520 I/O + ICH10 4 x 4096 MB DDR3-1333MT/s 500GB LOGICAL VOLUME llvmpipe 16GB SME1920NR 4 x Broadcom NetXtreme II BCM5709 Fedora 31 5.3.7-301.fc31.x86_64 (x86_64) X Server 1.20.5 modesetting 1.20.5 3.3 Mesa 19.2.0 (LLVM 9.0 128 bits) ext4 1280x1024 2 x AMD Opteron 6380 @ 2.50GHz (16 Cores / 32 Threads) Supermicro H8DG6/H8DGi v1.0 (3.5c BIOS) AMD RD890 + SB7x0/SB8x0/SB9x0 8 x 16384 MB DDR3-1600MHz 4 x 1000GB Seagate ST1000DM010-2EP1 + 2 x 1024GB 1TB SATA SSD Matrox MGA G200eW WPCM450 2GB AMD Cape Verde/Pitcairn ASUS VP247 2 x Intel 82576 + Intel 7265 Slackware 14.2 5.4.23 (x86_64) Xfce X Server 1.18.3 radeon 7.7.0 GCC 5.5.0 + Clang 3.8.0 + LLVM 3.8.0 1920x1080 OpenBenchmarking.org Processor Details - 2 x Intel Xeon E5620: Scaling Governor: pcc-cpufreq performance - CPU Microcode: 0x1f - optepr0n: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x600084f Security Details - 2 x Intel Xeon E5620: SELinux + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling - optepr0n: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
proc y-cruncher: Calculating 500M Pi Digits Difference Standard Error Standard Deviation 2 x Intel Xeon E5620 optepr0n 126.704 1.00x 0.06 0.09% 61.879 1.51x 2.93 18.36% OpenBenchmarking.org
Y-Cruncher Calculating 500M Pi Digits OpenBenchmarking.org Seconds, Fewer Is Better Y-Cruncher 0.7.8.9503 Calculating 500M Pi Digits 2 x Intel Xeon E5620 optepr0n 30 60 90 120 150 SE +/- 0.06, N = 3 SE +/- 2.93, N = 15 126.70 61.88
Phoronix Test Suite v10.8.4