pts-mem-suite-result-0-17
2 x Intel Xeon E5-2680 v3 testing with a Supermicro X10DRW-iT v1.02 (1.1-NSr1 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
2020-04-12 17:15
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Supermicro X10DRW-iT v1.02 (1.1-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 32 GB + 32 GB + 32 GB + 32 GB DDR4-1866MHz, Disk: 8000GB SMC3108 + 240GB TOSHIBA THNSNJ24, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2 + Napatech A/S
OS: CentOS Linux 7, Kernel: 3.10.0-957.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3a
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: SMT vulnerable L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
2020-04-12 17:15
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Supermicro X10DRW-iT v1.02 (1.1-NSr1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 32 GB + 32 GB + 32 GB + 32 GB DDR4-1866MHz, Disk: 8000GB SMC3108 + 240GB TOSHIBA THNSNJ24, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2 + Napatech A/S
OS: CentOS Linux 7, Kernel: 3.10.0-957.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3a
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: SMT vulnerable L1D conditional cache flushes + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
Testing initiated at 12 April 2020 17:15 by user .