2 x Intel Xeon Gold 6144 + Matrox G200eW3 + Dell PowerEdge R640 08HT8T (2.21.2 BIOS)

Various open-source benchmarks by the Phoronix Test Suite v10.8.5.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2410172-NE-2XINTELXE84
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2024-10-17 13:46
October 17
  1 Minute
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


2 x Intel Xeon Gold 6144 + Matrox G200eW3 + Dell PowerEdge R640 08HT8T (2.21.2 BIOS)OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads)Dell PowerEdge R640 08HT8T (2.21.2 BIOS)Intel Sky Lake-E DMI3 Registers4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFDMatrox G200eW34 x Intel X550 + 4 x Intel I350Debian GNU/Linux 126.8.12-2-pve (x86_64)ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelFile-SystemScreen Resolution2 X Intel Xeon Gold 6144 + Matrox G200eW3 + Dell PowerEdge R640 08HT8T (2.21.2 BIOS) BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

PHP Micro Benchmarks

Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterPHP Micro BenchmarksTest: Zend bench2024-10-17 13:460.3220.6440.9661.2881.61SE +/- 0.001, N = 31.431

OpenBenchmarking.orgSeconds, Fewer Is BetterPHP Micro BenchmarksTest: Zend micro_bench2024-10-17 13:46246810SE +/- 0.001, N = 38.157