ipc-domain-socket-0220-r2
AAA
TEST-IPC-2
Processor: 2 x Intel Xeon Gold 6242R (40 Cores), Motherboard: Supermicro X11DPU v1.10 (3.4a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 6 x 32 GB DDR4-2934MT/s Samsung M393A4K40DB3-CWE, Disk: 2 x 480GB INTEL SSDSC2KB48 + 2 x 960GB INTEL SSDSC2KB96, Graphics: ASPEED, Network: 4 x Intel I350 + 2 x Xilinx Device 5084 + 2 x Solarflare XtremeScale SFC9250 10/25/40/50/100G
OS: CentOS Linux 7, Kernel: 3.10.0-1160.95.1.el7.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5003003
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: Load fences __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
IPC_benchmark
IPC_benchmark is a Linux inter-process communication benchmark. Learn more via the OpenBenchmarking.org test page.
TEST-IPC-2
Processor: 2 x Intel Xeon Gold 6242R (40 Cores), Motherboard: Supermicro X11DPU v1.10 (3.4a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 6 x 32 GB DDR4-2934MT/s Samsung M393A4K40DB3-CWE, Disk: 2 x 480GB INTEL SSDSC2KB48 + 2 x 960GB INTEL SSDSC2KB96, Graphics: ASPEED, Network: 4 x Intel I350 + 2 x Xilinx Device 5084 + 2 x Solarflare XtremeScale SFC9250 10/25/40/50/100G
OS: CentOS Linux 7, Kernel: 3.10.0-1160.95.1.el7.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: never
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5003003
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: Load fences __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 19 February 2024 20:37 by user root.