2025-02-11-1917

2 x Intel Xeon E5-2680 v2 testing with a Supermicro X9DRL-3F/iF v1.01 (3.0a BIOS) and Matrox MGA G200eW WPCM450 on Arch Linux via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2502111-NE-20250211109
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs
No Box Plots
On Line Graphs With Missing Data, Connect The Line Gaps

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x Intel Xeon E5-2680 v2
February 11
  2 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


2025-02-11-1917OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads)Supermicro X9DRL-3F/iF v1.01 (3.0a BIOS)Intel Xeon E7 v2/Xeon8 x 16 GB DDR3-1600MT/s Samsung M393B2G70DB0-5 x 512GB TEAM T253512GBMatrox MGA G200eW WPCM4502 x Intel 82574LArch Linux6.13.2-arch1-1 (x86_64)GCC 14.2.1 20250207 + Clang 19.1.7btrfs640x480ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen Resolution2025-02-11-1917 BenchmarksSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x416- OpenJDK Runtime Environment (build 11.0.26+4)- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

Bork File Encrypter

MinAvgMax2 x Intel Xeon E5-2680 v227.028.830.0OpenBenchmarking.orgCelsius, Fewer Is BetterBork File Encrypter 1.4CPU Temperature Monitor918273645

MinAvgMax2 x Intel Xeon E5-2680 v233.035.239.0OpenBenchmarking.orgCelsius, Fewer Is BetterBork File Encrypter 1.4System Temperature Monitor1122334455

OpenBenchmarking.orgSeconds, Fewer Is BetterBork File Encrypter 1.4File Encryption Time2 x Intel Xeon E5-2680 v23691215SE +/- 0.11, N = 712.52