AX2690D-bench
2 x Intel Xeon E5-2690 v4 testing with a Supermicro X10DAX v1.02 (2.0b BIOS) and AMD Radeon HD 7470/8470 / R5 235/310 OEM 1GB on Ubuntu 20.04 via the Phoronix Test Suite.
clean test
Processor: 2 x Intel Xeon E5-2690 v4 @ 3.50GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DAX v1.02 (2.0b BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 256GB, Disk: 800GB INTEL SSDPEDMD800G4 + 2000GB Seagate ST2000NM0033-9ZM + 4001GB HGST HUS724040AL + 800GB EK000800GWEPF, Graphics: AMD Radeon HD 7470/8470 / R5 235/310 OEM 1GB, Audio: AMD Caicos HDMI Audio, Monitor: LCD2090UXi, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.4.0-117-generic (x86_64), Desktop: KDE Plasma 5.18.8, Display Server: X Server 1.20.13, Vulkan: 1.1.182, Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1600x1200
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb00003e
Python Notes: Python 2.7.18 + Python 3.8.10
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Build2
This test profile measures the time to bootstrap/install the build2 C++ build toolchain from source. Build2 is a cross-platform build toolchain for C/C++ code and features Cargo-like features. Learn more via the OpenBenchmarking.org test page.
Timed Apache Compilation
This test times how long it takes to build the Apache HTTPD web server. Learn more via the OpenBenchmarking.org test page.
Timed Clash Compilation
Build the clash-lang Haskell to VHDL/Verilog/SystemVerilog compiler with GHC 8.10.1 Learn more via the OpenBenchmarking.org test page.
Timed Eigen Compilation
This test times how long it takes to build all Eigen examples. The Eigen examples are compiled serially. Eigen is a C++ template library for linear algebra. Learn more via the OpenBenchmarking.org test page.
Timed Erlang/OTP Compilation
This test times how long it takes to compile Erlang/OTP. Erlang is a programming language and run-time for massively scalable soft real-time systems with high availability requirements. Learn more via the OpenBenchmarking.org test page.
Timed FFmpeg Compilation
This test times how long it takes to build the FFmpeg multimedia library. Learn more via the OpenBenchmarking.org test page.
Timed GCC Compilation
This test times how long it takes to build the GNU Compiler Collection (GCC) compiler. Learn more via the OpenBenchmarking.org test page.
Timed GDB GNU Debugger Compilation
This test times how long it takes to build the GNU Debugger (GDB) in a default configuration. Learn more via the OpenBenchmarking.org test page.
clean test: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: gdb-10.2/missing: 81: makeinfo: not found
Timed Gem5 Compilation
This test times how long it takes to compile Gem5. Gem5 is a simulator for computer system architecture research. Gem5 is widely used for computer architecture research within the industry, academia, and more. Learn more via the OpenBenchmarking.org test page.
Timed Godot Game Engine Compilation
This test times how long it takes to compile the Godot Game Engine. Godot is a popular, open-source, cross-platform 2D/3D game engine and is built using the SCons build system and targeting the X11 platform. Learn more via the OpenBenchmarking.org test page.
Timed ImageMagick Compilation
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Timed LLVM Compilation
This test times how long it takes to build the LLVM compiler stack. Learn more via the OpenBenchmarking.org test page.
Timed Mesa Compilation
This test profile times how long it takes to compile Mesa with Meson/Ninja. For minimizing build dependencies and avoid versioning conflicts, test this is just the core Mesa build without LLVM or the extra Gallium3D/Mesa drivers enabled. Learn more via the OpenBenchmarking.org test page.
Timed MPlayer Compilation
This test times how long it takes to build the MPlayer open-source media player program. Learn more via the OpenBenchmarking.org test page.
Timed Node.js Compilation
This test profile times how long it takes to build/compile Node.js itself from source. Node.js is a JavaScript run-time built from the Chrome V8 JavaScript engine while itself is written in C/C++. Learn more via the OpenBenchmarking.org test page.
Timed PHP Compilation
This test times how long it takes to build PHP 7. Learn more via the OpenBenchmarking.org test page.
Timed Wasmer Compilation
This test times how long it takes to compile Wasmer. Wasmer is written in the Rust programming language and is a WebAssembly runtime implementation that supports WASI and EmScripten. This test profile builds Wasmer with the Cranelift and Singlepast compiler features enabled. Learn more via the OpenBenchmarking.org test page.
clean test
Processor: 2 x Intel Xeon E5-2690 v4 @ 3.50GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DAX v1.02 (2.0b BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 256GB, Disk: 800GB INTEL SSDPEDMD800G4 + 2000GB Seagate ST2000NM0033-9ZM + 4001GB HGST HUS724040AL + 800GB EK000800GWEPF, Graphics: AMD Radeon HD 7470/8470 / R5 235/310 OEM 1GB, Audio: AMD Caicos HDMI Audio, Monitor: LCD2090UXi, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.4.0-117-generic (x86_64), Desktop: KDE Plasma 5.18.8, Display Server: X Server 1.20.13, Vulkan: 1.1.182, Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1600x1200
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb00003e
Python Notes: Python 2.7.18 + Python 3.8.10
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 13 June 2022 14:13 by user wan.