2 x Intel Xeon E5-2620 0 testing with a Supermicro X9DR3-F v0123456789 (3.3 BIOS) and Matrox MGA G200eW WPCM450 on Debian 10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon E5-2620 0 @ 2.50GHz (12 Cores / 24 Threads), Motherboard: Supermicro X9DR3-F v0123456789 (3.3 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 4096 MB DDR3-1333MT/s HMT351E7CFR8C, Disk: 480GB INTEL SSDSC2BB48, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel I350
OS: Debian 10, Kernel: 5.10.0-0.bpo.8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
This is a test of 7-Zip compression/decompression with its integrated benchmark feature. Learn more via the OpenBenchmarking.org test page.
This is a test of ab, which is the Apache benchmark program, using the system's supplied Apache web server. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon E5-2620 0 - Matrox MGA G200eW WPCM450: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status.
Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon E5-2620 0: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
This is a MariaDB MySQL database server benchmark making use of mysqlslap. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of the lightweight Nginx HTTP(S) web-server. This Nginx web server benchmark test profile relies upon nginx being present in the system PATH / already installed on the system if wanting to benchmark the operating system's provided nginx package. Use the pts/ngnx test profile if wanting to test a locally-built Nginx web server. Wrk is used for facilitating the HTTP web server load testing. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 February 2022 01:33 by user root.
Processor: 2 x Intel Xeon E5-2620 0 @ 2.50GHz (12 Cores / 24 Threads), Motherboard: Supermicro X9DR3-F v0123456789 (3.3 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 4096 MB DDR3-1333MT/s HMT351E7CFR8C, Disk: 480GB INTEL SSDSC2BB48, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel I350
OS: Debian 10, Kernel: 5.10.0-0.bpo.8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 February 2022 01:36 by user root.