CentOS Linux 8 Benchmarks
Various open-source benchmarks by the Phoronix Test Suite v9.6.0 (Nittedal).
4 x Intel Xeon E5-4607 0
Processor: 4 x Intel Xeon E5-4607 0 @ 2.20GHz (24 Cores / 48 Threads), Motherboard: Supermicro X9QR7-TF+/X9QRi-F+ v123456789 (3.0b BIOS), Chipset: Intel Xeon E5/Core, Memory: 32 x 16384 MB DDR3-1066MT/s Kingston, Disk: 160GB INTEL SSDSC2BB16 + 3594GB Logical Volume, Graphics: Matrox MGA G200eW WPCM450, Monitor: BenQ FP202W, Network: 2 x Intel I350
OS: CentOS Linux 8, Kernel: 4.18.0-147.8.1.el8_1.x86_64 (x86_64), Compiler: GCC 8.3.1 20190507, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x714
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
GnuPG
This test times how long it takes to encrypt a file using GnuPG. Learn more via the OpenBenchmarking.org test page.
PSSTOP Memory test
Shows the total number of processes running and the memory they consume Learn more via the OpenBenchmarking.org test page.
4 x Intel Xeon E5-4607 0
Processor: 4 x Intel Xeon E5-4607 0 @ 2.20GHz (24 Cores / 48 Threads), Motherboard: Supermicro X9QR7-TF+/X9QRi-F+ v123456789 (3.0b BIOS), Chipset: Intel Xeon E5/Core, Memory: 32 x 16384 MB DDR3-1066MT/s Kingston, Disk: 160GB INTEL SSDSC2BB16 + 3594GB Logical Volume, Graphics: Matrox MGA G200eW WPCM450, Monitor: BenQ FP202W, Network: 2 x Intel I350
OS: CentOS Linux 8, Kernel: 4.18.0-147.8.1.el8_1.x86_64 (x86_64), Compiler: GCC 8.3.1 20190507, File-System: xfs, Screen Resolution: 1280x1024
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x714
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 8 May 2020 12:21 by user .