stream-moria
Intel Xeon X3450 testing with a Supermicro X8SIA v0123456789 (1.0b BIOS) and Matrox MGA G200eW WPCM450 on CentOS Linux 7 via the Phoronix Test Suite.
stream-moria-1
Processor: Intel Xeon X3450 @ 2.67GHz (4 Cores / 8 Threads), Motherboard: Supermicro X8SIA v0123456789 (1.0b BIOS), Chipset: Intel Core DMI, Memory: 4 x 4096 MB DDR3-1333MT/s Micron 18JSF51272PDZ1G4D1, Disk: 5 x 1000GB Hitachi HDS72101, Graphics: Matrox MGA G200eW WPCM450, Monitor: AL1706, Network: 2 x Intel 82574L
OS: CentOS Linux 7, Kernel: 3.10.0-1160.53.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Enabled) - CPU Microcode: 0xa
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Not affected
Stream
This is a benchmark of Stream, the popular system memory (RAM) benchmark. Learn more via the OpenBenchmarking.org test page.
stream-moria-1
Processor: Intel Xeon X3450 @ 2.67GHz (4 Cores / 8 Threads), Motherboard: Supermicro X8SIA v0123456789 (1.0b BIOS), Chipset: Intel Core DMI, Memory: 4 x 4096 MB DDR3-1333MT/s Micron 18JSF51272PDZ1G4D1, Disk: 5 x 1000GB Hitachi HDS72101, Graphics: Matrox MGA G200eW WPCM450, Monitor: AL1706, Network: 2 x Intel 82574L
OS: CentOS Linux 7, Kernel: 3.10.0-1160.53.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Enabled) - CPU Microcode: 0xa
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 January 2022 18:47 by user .