AMD Ryzen 5 3600 6-Core testing with a ASRockRack X470D4U (P3.50 BIOS) and Microsoft Basic Display on Microsoft Windows Server 2019 Standard Evaluation Build 17763 via the Phoronix Test Suite.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (6 Cores / 12 Threads), Motherboard: ASRockRack X470D4U (P3.50 BIOS), Memory: 2 x 32768 MB 3200MHz Kingston, Disk: 932GB Samsung SSD 980 1TB + 0GB AMI Virtual HDisk0 USB, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand, Network: Intel I210 Gigabit Connection + Mellanox ConnectX-2
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.1, File-System: NTFS, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Processor: 4 x AMD Ryzen 5 3600 6-Core @ 3.59GHz (4 Cores), Motherboard: Intel 440BX (VMW71.00V.16460286.B64.2006250725 BIOS), Memory: 1 x 4096 MB 0MHz VMW-4096MB, Disk: 60GB VMware Virtual disk Disk, Graphics: VMware SVGA 3D, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 8.17.3.5, File-System: NTFS, Screen Resolution: 1078x668, System Layer: VMware
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (2 Cores / 4 Threads), Motherboard: Microsoft Virtual Machine (090007 BIOS), Memory: 3968 + 128, Disk: 60GB Virtual HD, Graphics: Microsoft Hyper-V Video, Monitor: HyprVMotor
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.2145, File-System: NTFS, Screen Resolution: 1024x768, System Layer: Microsoft Hyper-V Server
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Changed Motherboard to Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS).
Changed Memory to 3968 + 128 0MHz.
Changed Disk to 60GB Microsoft Virtual Disk.
Changed Motherboard to Microsoft Virtual Machine (090008 BIOS).
Changed Memory to 3968 + 128.
Changed Disk to 60GB Virtual HD.
Changed Motherboard to Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS).
Changed Memory to 3968 + 128 0MHz.
Changed Disk to 60GB Microsoft Virtual Disk.
Processor: 4 x Common KVM @ 3.59GHz (4 Cores), Motherboard: (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 1 x 4096 MB 0MHz QEMU, Disk: 60GB Red Hat VirtIO Disk, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.1, File-System: NTFS, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 6500000100000000
Security Notes: __user pointer sanitization: Disabled
Processor: 2 x AMD Ryzen 5 3600 6-Core @ 3.59GHz (4 Cores), Motherboard: (4.13 BIOS), Memory: 1 x 4088 MB 48MHz, Disk: 60GB XENSRC PVDISK Disk, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand, Network: Intel PRO/1000 MT Connection
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled
This is a test of 7-Zip using p7zip with its integrated benchmark feature or upstream 7-Zip for the Windows x64 build. Learn more via the OpenBenchmarking.org test page.
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
iPerf is a network bandwidth throughput testing software. This test profile is used for automated testing of an iperf client and requires you have access to an iperf server. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (6 Cores / 12 Threads), Motherboard: ASRockRack X470D4U (P3.50 BIOS), Memory: 2 x 32768 MB 3200MHz Kingston, Disk: 932GB Samsung SSD 980 1TB + 0GB AMI Virtual HDisk0 USB, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand, Network: Intel I210 Gigabit Connection + Mellanox ConnectX-2
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.1, File-System: NTFS, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Testing initiated at 26 September 2021 16:19 by user Administrator.
Processor: 4 x AMD Ryzen 5 3600 6-Core @ 3.59GHz (4 Cores), Motherboard: Intel 440BX (VMW71.00V.16460286.B64.2006250725 BIOS), Memory: 1 x 4096 MB 0MHz VMW-4096MB, Disk: 60GB VMware Virtual disk Disk, Graphics: VMware SVGA 3D, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 8.17.3.5, File-System: NTFS, Screen Resolution: 1078x668, System Layer: VMware
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled
Testing initiated at 2 October 2021 14:42 by user Administrator.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (2 Cores / 4 Threads), Motherboard: Microsoft Virtual Machine (090007 BIOS), Memory: 3968 + 128, Disk: 60GB Virtual HD, Graphics: Microsoft Hyper-V Video, Monitor: HyprVMotor
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.2145, File-System: NTFS, Screen Resolution: 1024x768, System Layer: Microsoft Hyper-V Server
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Testing initiated at 22 September 2021 09:10 by user Administrator.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (2 Cores / 4 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.0 BIOS), Memory: 3968 + 128 0MHz, Disk: 60GB Microsoft Virtual Disk, Graphics: Microsoft Hyper-V Video, Monitor: HyprVMotor
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.2145, File-System: NTFS, Screen Resolution: 1024x768, System Layer: Microsoft Hyper-V Server
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Testing initiated at 19 September 2021 19:22 by user Administrator.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (2 Cores / 4 Threads), Motherboard: Microsoft Virtual Machine (090008 BIOS), Memory: 3968 + 128, Disk: 60GB Virtual HD, Graphics: Microsoft Hyper-V Video, Monitor: HyprVMotor
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.2145, File-System: NTFS, Screen Resolution: 1024x768, System Layer: Microsoft Hyper-V Server
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Testing initiated at 29 September 2021 17:23 by user Administrator.
Processor: AMD Ryzen 5 3600 6-Core @ 3.59GHz (2 Cores / 4 Threads), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 3968 + 128 0MHz, Disk: 60GB Microsoft Virtual Disk, Graphics: Microsoft Hyper-V Video, Monitor: HyprVMotor
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.2145, File-System: NTFS, Screen Resolution: 1024x768, System Layer: Microsoft Hyper-V Server
Security Notes: __user pointer sanitization: Disabled + STIBP: Enabled
Testing initiated at 29 September 2021 18:39 by user Administrator.
Processor: 4 x Common KVM @ 3.59GHz (4 Cores), Motherboard: (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 1 x 4096 MB 0MHz QEMU, Disk: 60GB Red Hat VirtIO Disk, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.1, File-System: NTFS, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 6500000100000000
Security Notes: __user pointer sanitization: Disabled
Testing initiated at 25 September 2021 21:02 by user Administrator.
Processor: 2 x AMD Ryzen 5 3600 6-Core @ 3.59GHz (4 Cores), Motherboard: (4.13 BIOS), Memory: 1 x 4088 MB 48MHz, Disk: 60GB XENSRC PVDISK Disk, Graphics: Microsoft Basic Display, Monitor: Get-WmiObject : Not supported At line:1 char:4+ $((Get-WmiObject WmiMonitorID-Namespace root\wmi) | %{ $Name = $($_. ...+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : Operation: (:) [Get-WmiObject] ManagementException + FullyQualifiedErrorId : GetWMIManagementException Microsoft.PowerShell mands.GetWmiObjectCommand, Network: Intel PRO/1000 MT Connection
OS: Microsoft Windows Server 2019 Standard Evaluation Build 17763, Kernel: 10.0 (x86_64), Display Driver: 10.0.17763.1, File-System: NTFS, Screen Resolution: 1024x768
Processor Notes: CPU Microcode: 2110700800000000
Security Notes: __user pointer sanitization: Disabled
Testing initiated at 4 October 2021 17:30 by user Administrator.