x3650kerneltest
2 x Intel Xeon E5-2690 0 testing with a IBM 00Y8362 (-[VVE172BUS-3.30] BIOS) and Matrox G200eR2 on CentOS Linux 7 via the Phoronix Test Suite.
x3650kerneltest01
Processor: 2 x Intel Xeon E5-2690 0 @ 3.80GHz (16 Cores / 32 Threads), Motherboard: IBM 00Y8362 (-[VVE172BUS-3.30] BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 16384 MB DDR3-1600MT/s Hynix HMT42GR7AFR4C-PB, Disk: 250GB ServeRAID M5110e, Graphics: Matrox G200eR2, Network: 4 x Intel I350 + 2 x Emulex OneConnect 10Gb NIC
OS: CentOS Linux 7, Kernel: 3.10.0-1160.15.2.el7.x86_64 (x86_64), Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x71a
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Not affected
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
x3650kerneltest01
Processor: 2 x Intel Xeon E5-2690 0 @ 3.80GHz (16 Cores / 32 Threads), Motherboard: IBM 00Y8362 (-[VVE172BUS-3.30] BIOS), Chipset: Intel Xeon E5/Core, Memory: 8 x 16384 MB DDR3-1600MT/s Hynix HMT42GR7AFR4C-PB, Disk: 250GB ServeRAID M5110e, Graphics: Matrox G200eR2, Network: 4 x Intel I350 + 2 x Emulex OneConnect 10Gb NIC
OS: CentOS Linux 7, Kernel: 3.10.0-1160.15.2.el7.x86_64 (x86_64), Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x71a
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 February 2021 02:16 by user .