pts-mem-suite-result
2 x Intel Xeon Platinum 8168 testing with a Supermicro X11DPH-T v1.01 (3.1-NSr1 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
12 x 32 GB DDR4-2666MT
Processor: 2 x Intel Xeon Platinum 8168 @ 3.70GHz (48 Cores / 96 Threads), Motherboard: Supermicro X11DPH-T v1.01 (3.1-NSr1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 32 GB DDR4-2666MT/s HMA84GR7AFR4N-VK, Disk: 56003GB MR9361-8i + 240GB INTEL SSDSC2KB24, Graphics: ASPEED, Network: 2 x Intel X722 for 10GBASE-T + Napatech A/S
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2000064
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
t-test1
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
12 x 32 GB DDR4-2666MT
Processor: 2 x Intel Xeon Platinum 8168 @ 3.70GHz (48 Cores / 96 Threads), Motherboard: Supermicro X11DPH-T v1.01 (3.1-NSr1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 32 GB DDR4-2666MT/s HMA84GR7AFR4N-VK, Disk: 56003GB MR9361-8i + 240GB INTEL SSDSC2KB24, Graphics: ASPEED, Network: 2 x Intel X722 for 10GBASE-T + Napatech A/S
OS: CentOS Linux 7, Kernel: 3.10.0-1062.18.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext3, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2000064
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 10 May 2020 18:59 by user root.