2023-11-20-2041

Intel 0000 testing with a Supermicro X10DRi v1.10 (3.1 BIOS) and ASPEED on Arch Linux via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2311201-NE-20231120257
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs
No Box Plots
On Line Graphs With Missing Data, Connect The Line Gaps

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel 0000
November 20 2023
  1 Minute
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


2023-11-20-2041OpenBenchmarking.orgPhoronix Test SuiteIntel 0000 @ 2.60GHz (14 Cores / 28 Threads)Supermicro X10DRi v1.10 (3.1 BIOS)Intel Xeon E7 v4/Xeon128GB2000GB MR9361-8iASPEEDS19C1502 x Intel I350Arch Linux6.6.1-arch1-1 (x86_64)xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelFile-SystemScreen Resolution2023-11-20-2041 BenchmarksSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x14 - OpenJDK Runtime Environment (build 11.0.21+9)- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

Bork File Encrypter

Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterBork File Encrypter 1.4File Encryption TimeIntel 00003691215SE +/- 0.04, N = 411.49