ipc-domain-socket-0220-r2
AAA
TEST-IPC-2
Processor: 2 x Intel Xeon Gold 6242R (40 Cores), Motherboard: Supermicro X11DPU v1.10 (3.4a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 6 x 32 GB DDR4-2934MT/s Samsung M393A4K40DB3-CWE, Disk: 2 x 480GB INTEL SSDSC2KB48 + 2 x 960GB INTEL SSDSC2KB96, Graphics: ASPEED, Monitor: L9W, Network: 4 x Intel I350 + 4 x Solarflare XtremeScale SFC9250 10/25/40/50/100G
OS: CentOS Linux 7, Kernel: 5.4.265-1.el7.elrepo.x86_64 (x86_64), Compiler: GCC 8.3.1 20190311, File-System: xfs, Screen Resolution: 1440x900
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5003003
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
IPC_benchmark
IPC_benchmark is a Linux inter-process communication benchmark. Learn more via the OpenBenchmarking.org test page.
TEST-IPC-2
Processor: 2 x Intel Xeon Gold 6242R (40 Cores), Motherboard: Supermicro X11DPU v1.10 (3.4a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 6 x 32 GB DDR4-2934MT/s Samsung M393A4K40DB3-CWE, Disk: 2 x 480GB INTEL SSDSC2KB48 + 2 x 960GB INTEL SSDSC2KB96, Graphics: ASPEED, Monitor: L9W, Network: 4 x Intel I350 + 4 x Solarflare XtremeScale SFC9250 10/25/40/50/100G
OS: CentOS Linux 7, Kernel: 5.4.265-1.el7.elrepo.x86_64 (x86_64), Compiler: GCC 8.3.1 20190311, File-System: xfs, Screen Resolution: 1440x900
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5003003
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 19 February 2024 20:38 by user .