hpc01-compress-gzip
2 x Intel Xeon E5-2637 v4 testing with a Dell 02C2CP (2.3.4 BIOS) and Matrox G200eR2 on CentOS 6.10 via the Phoronix Test Suite.
2 x Intel Xeon E5-2637 v4
Processor: 2 x Intel Xeon E5-2637 v4 (8 Cores / 16 Threads), Motherboard: Dell 02C2CP (2.3.4 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 32 GB DDR4-2400MHz HMA84GR7MFR4N-UH, Disk: 1200GB PERC H730 Mini, Graphics: Matrox G200eR2, Network: 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 2 x Intel I350
OS: CentOS 6.10, Kernel: 2.6.32-754.25.1.el6.x86_64 (x86_64), Display Server: X Server 1.17.4, Display Driver: modesetting 1.17.4, Compiler: GCC 4.4.7 20120313, File-System: ext4
Processor Notes: CPU Microcode: 0xb00001e
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon E5-2637 v4
Processor: 2 x Intel Xeon E5-2637 v4 (8 Cores / 16 Threads), Motherboard: Dell 02C2CP (2.3.4 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 32 GB DDR4-2400MHz HMA84GR7MFR4N-UH, Disk: 1200GB PERC H730 Mini, Graphics: Matrox G200eR2, Network: 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 2 x Intel I350
OS: CentOS 6.10, Kernel: 2.6.32-754.25.1.el6.x86_64 (x86_64), Display Server: X Server 1.17.4, Display Driver: modesetting 1.17.4, Compiler: GCC 4.4.7 20120313, File-System: ext4
Processor Notes: CPU Microcode: 0xb00001e
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 17 January 2020 17:42 by user .