2 x Intel Xeon C5509 Performance
Various open-source benchmarks by the Phoronix Test Suite v10.4.0 (Ibestad).
2 x Intel Xeon C5509
Processor: 2 x Intel Xeon C5509 @ 2.00GHz (8 Cores), Motherboard: American Megatrends 4.6.3, Chipset: Intel Xeon C5500/C3500, Memory: 6GB, Disk: 120GB KINGSTON SA400S3, Graphics: llvmpipe, Network: Intel 82578DM + 2 x Intel 82575EB
OS: Fedora 34, Kernel: 5.12.13-300.fc34.x86_64 (x86_64), Desktop: GNOME Shell 40.2, Display Server: X Server 1.20.11, OpenGL: 4.5 Mesa 21.1.3 (LLVM 12.0.0 128 bits), Compiler: GCC 11.1.1 20210531, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0xffff0002
Python Notes: Python 3.9.5
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
dcraw
This test times how long it takes to convert several high-resolution RAW NEF image files to PPM image format using dcraw. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon C5509
Processor: 2 x Intel Xeon C5509 @ 2.00GHz (8 Cores), Motherboard: American Megatrends 4.6.3, Chipset: Intel Xeon C5500/C3500, Memory: 6GB, Disk: 120GB KINGSTON SA400S3, Graphics: llvmpipe, Network: Intel 82578DM + 2 x Intel 82575EB
OS: Fedora 34, Kernel: 5.12.13-300.fc34.x86_64 (x86_64), Desktop: GNOME Shell 40.2, Display Server: X Server 1.20.11, OpenGL: 4.5 Mesa 21.1.3 (LLVM 12.0.0 128 bits), Compiler: GCC 11.1.1 20210531, File-System: btrfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0xffff0002
Python Notes: Python 3.9.5
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2021 19:06 by user svmlegacy.