BmtTest_
2 x Intel Xeon E5-2630 0 testing with a HP ProLiant DL380p Gen8 (P70 BIOS) and Matrox MGA G200EH on CentOS 7.8.2003 via the Phoronix Test Suite.
BmtTest_
Processor: 2 x Intel Xeon E5-2630 0 @ 2.30GHz (12 Cores / 24 Threads), Motherboard: HP ProLiant DL380p Gen8 (P70 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 8192 MB DDR3-1333MT/s 647650-071, Disk: 300GB LOGICAL VOLUME + 1200GB LOGICAL VOLUME, Graphics: Matrox MGA G200EH, Network: 4 x Broadcom NetXtreme BCM5719 PCIe
OS: CentOS 7.8.2003, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / data=ordered,relatime,rw,stripe=64 / Block Size: 4096
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
PostMark
This is a test of NetApp's PostMark benchmark designed to simulate small-file testing similar to the tasks endured by web and mail servers. This test profile will set PostMark to perform 25,000 transactions with 500 files simultaneously with the file sizes ranging between 5 and 512 kilobytes. Learn more via the OpenBenchmarking.org test page.
GnuPG
This test times how long it takes to encrypt a file using GnuPG. Learn more via the OpenBenchmarking.org test page.
BmtTest_
Processor: 2 x Intel Xeon E5-2630 0 @ 2.30GHz (12 Cores / 24 Threads), Motherboard: HP ProLiant DL380p Gen8 (P70 BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 8192 MB DDR3-1333MT/s 647650-071, Disk: 300GB LOGICAL VOLUME + 1200GB LOGICAL VOLUME, Graphics: Matrox MGA G200EH, Network: 4 x Broadcom NetXtreme BCM5719 PCIe
OS: CentOS 7.8.2003, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: DEADLINE / data=ordered,relatime,rw,stripe=64 / Block Size: 4096
Processor Notes: Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x714
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected
Testing initiated at 20 November 2020 09:11 by user .