2024-07-09-1057

2 x Intel Xeon E5-2680 v4 testing with a Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS) and Matrox MGA G200e [Pilot] on Arch Linux via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407093-NE-20240709183
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x Intel Xeon E5-2680 v4
July 09
  1 Minute


2024-07-09-1057OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores / 56 Threads)Intel S2600CW (SE5C610.86B.01.01.3029.022420221031 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-2134MT/s Samsung M393A2G40DB0-CPB4 x 2000GB KINGSTON SNV2S2000G + 3001GB Seagate ST33000651NS + 2000GB Western Digital WD20EARX-00P + 512GB TEAM T253512GBMatrox MGA G200e [Pilot]S19C1502 x Intel 10-Gigabit X540-AT2 + 4 x Realtek RTL8125 2.5GbEArch Linux6.9.7-arch1-1 (x86_64)GCC 14.1.1 20240522btrfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelCompilerFile-SystemScreen Resolution2024-07-09-1057 BenchmarksSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040- OpenJDK Runtime Environment (build 11.0.23+9)- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Bork File Encrypter

Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterBork File Encrypter 1.4File Encryption Time2 x Intel Xeon E5-2680 v43691215SE +/- 0.09, N = 411.58