pts-mem-suite-result-0-11
2 x Intel Xeon E5-2699 v3 testing with a Supermicro X10DRC-T4+ v1.01 (1.0b-NSr2 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
8 x 32 GB 2133MHz HMA84GR7MFR4N-TF
Processor: 2 x Intel Xeon E5-2699 v3 @ 3.60GHz (36 Cores / 72 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (1.0b-NSr2 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 32 GB 2133MHz HMA84GR7MFR4N-TF, Disk: 84008GB SMC3108 + 240GB Micron_M500DC_MT, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
8 x 32 GB 2133MHz HMA84GR7MFR4N-TF
Processor: 2 x Intel Xeon E5-2699 v3 @ 3.60GHz (36 Cores / 72 Threads), Motherboard: Supermicro X10DRC-T4+ v1.01 (1.0b-NSr2 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 8 x 32 GB 2133MHz HMA84GR7MFR4N-TF, Disk: 84008GB SMC3108 + 240GB Micron_M500DC_MT, Graphics: ASPEED, Network: 4 x Intel 10-Gigabit X540-AT2
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Display Server: X Server, Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x3a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 15 April 2020 20:27 by user .