2 x Intel Xeon Platinum 8380 testing with a Dell 0WMWCR (1.1.3 BIOS) and Matrox G200eW3 45GB on Red Hat Enterprise Linux 8.4 via the Phoronix Test Suite.
Processor: 2 x Intel Xeon Platinum 8380 (80 Cores / 160 Threads), Motherboard: Dell 0WMWCR (1.1.3 BIOS), Chipset: Intel Device 0998, Memory: 32 x GB DDR4-3200MT/s HMAA4GR7AJR8N-XN, Disk: 7680GB PERC H755 Front + 480GB DELLBOSS VD, Graphics: Matrox G200eW3 45GB, Network: 2 x Broadcom NetXtreme BCM5720 2-port PCIe + 2 x Intel E810-XXV for SFP
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.el8.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: CPU Microcode: 0xd0002a0
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
This test runs the ANSI C version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This test is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Platinum 8380 (80 Cores / 160 Threads), Motherboard: Dell 0WMWCR (1.1.3 BIOS), Chipset: Intel Device 0998, Memory: 32 x GB DDR4-3200MT/s HMAA4GR7AJR8N-XN, Disk: 7680GB PERC H755 Front + 480GB DELLBOSS VD, Graphics: Matrox G200eW3 45GB, Network: 2 x Broadcom NetXtreme BCM5720 2-port PCIe + 2 x Intel E810-XXV for SFP
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.el8.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: CPU Microcode: 0xd0002a0
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 August 2021 01:53 by user .