pts-processor-suite-result
2 x Intel Xeon E5-2697 v3 testing with a Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
2 x Intel Xeon E5-2697 v3
Processor: 2 x Intel Xeon E5-2697 v3 @ 3.60GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF, Disk: 84008GB SMC3108 + 200GB INTEL SSDSC2BA20, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3c
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Timed HMMer Search
This test searches through the Pfam database of profile hidden markov models. The search finds the domain structure of Drosophila Sevenless protein. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon E5-2697 v3
Processor: 2 x Intel Xeon E5-2697 v3 @ 3.60GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF, Disk: 84008GB SMC3108 + 200GB INTEL SSDSC2BA20, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3c
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Testing initiated at 4 April 2020 06:16 by user .