stream_xugu
2 x Intel Xeon E5-2680 v4 testing with a Dell 0WCJNT (2.7.1 BIOS) and Matrox G200eR2 on CentOS 7.4.1708 via the Phoronix Test Suite.
stream_xufu
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores), Motherboard: Dell 0WCJNT (2.7.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 64GB, Disk: 299GB PERC H330 Mini + 2000GB Seagate ST2000NM0018-2F3, Graphics: Matrox G200eR2, Network: 4 x Broadcom NetXtreme BCM5720 PCIe + 4 x Mellanox MT27710
OS: CentOS 7.4.1708, Kernel: 4.18.0-2.2.1.kwai.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623 + Clang 8.0.1 + LLVM 8.0.1, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb00002a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
stream_xufu
Processor: 2 x Intel Xeon E5-2680 v4 @ 3.30GHz (28 Cores), Motherboard: Dell 0WCJNT (2.7.1 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 64GB, Disk: 299GB PERC H330 Mini + 2000GB Seagate ST2000NM0018-2F3, Graphics: Matrox G200eR2, Network: 4 x Broadcom NetXtreme BCM5720 PCIe + 4 x Mellanox MT27710
OS: CentOS 7.4.1708, Kernel: 4.18.0-2.2.1.kwai.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623 + Clang 8.0.1 + LLVM 8.0.1, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0xb00002a
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 15 June 2020 04:57 by user .