pts-mem-suite-result-0-16
2 x Intel Xeon E5-2697 v3 testing with a Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF
Processor: 2 x Intel Xeon E5-2697 v3 @ 3.60GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF, Disk: 84008GB SMC3108 + 200GB INTEL SSDSC2BA20, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3c
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF
Processor: 2 x Intel Xeon E5-2697 v3 @ 3.60GHz (28 Cores / 56 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (3.0a-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 16384 MB DDR4-2133MHz HMA42GR7MFR4N-TF, Disk: 84008GB SMC3108 + 200GB INTEL SSDSC2BA20, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3c
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Testing initiated at 4 April 2020 11:03 by user .