results
2 x Intel Xeon E5-2680 0 testing with a IBM 00D2887 (-[VVE172BUS-3.30] BIOS) and Matrox G200eR2 on Arch rolling via the Phoronix Test Suite.
test1
Processor: 2 x Intel Xeon E5-2680 0 @ 3.50GHz (16 Cores / 32 Threads), Motherboard: IBM 00D2887 (-[VVE172BUS-3.30] BIOS), Chipset: Intel Xeon E5/Core, Memory: 126GB, Disk: 119GB ServeRAID M5110e + 4 x 4001GB Seagate ST4000DM004-2CV1 + 3001GB Seagate ST3000DM001-1CH1 + 3001GB Western Digital WD3000F9YZ-0 + 120GB KINGSTON SUV400S, Graphics: Matrox G200eR2, Network: 4 x Intel I350
OS: Arch rolling, Kernel: 5.9.14-arch1-1 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x718
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
x265
This is a simple test of the x265 encoder run on the CPU with 1080p and 4K options for H.265 video encode performance with x265. Learn more via the OpenBenchmarking.org test page.
test1
Processor: 2 x Intel Xeon E5-2680 0 @ 3.50GHz (16 Cores / 32 Threads), Motherboard: IBM 00D2887 (-[VVE172BUS-3.30] BIOS), Chipset: Intel Xeon E5/Core, Memory: 126GB, Disk: 119GB ServeRAID M5110e + 4 x 4001GB Seagate ST4000DM004-2CV1 + 3001GB Seagate ST3000DM001-1CH1 + 3001GB Western Digital WD3000F9YZ-0 + 120GB KINGSTON SUV400S, Graphics: Matrox G200eR2, Network: 4 x Intel I350
OS: Arch rolling, Kernel: 5.9.14-arch1-1 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x718
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 December 2020 19:11 by user lucas.