2335

2335

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2009186-NI-23351539040
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2335
September 18 2020
  1 Minute


2335OpenBenchmarking.orgPhoronix Test SuiteIntel Core i9-10980XE @ 3.00GHz (18 Cores)ASUS WS X299 PRO_SE (3101 BIOS)Intel Sky Lake-E DMI3 Registers3 x 8192 MB DDR4-3600MT/s2 x 480GB INTEL SSDSC2KB48astdrmfb2 x Intel I210 + 2 x Solarflare XtremeScale SFC9250 10/25/40/50/100GCentOS Linux 73.10.0-957.el7.x86_64 (x86_64)GCC 4.8.5 20150623xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen Resolution2335 BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic - Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x500012c- SELinux + l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS

Sysbench

This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgEvents Per Second, More Is BetterSysbench 2018-07-28Test: CPU23357K14K21K28K35KSE +/- 0.74, N = 330835.061. (CC) gcc options: -std=gnu99 -pthread -O3 -funroll-loops -ggdb3 -march=core2 -rdynamic -ldl -laio -lm