benchmark-cg2300-pts-stream

2 x Intel Xeon E5-2658 v4 testing with a Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS) and Matrox MGA G200e [Pilot] on Rocky Linux 8.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409073-NE-BENCHMARK99
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
8 x 16 GB DDR4-2400MT
September 07 2024
  4 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


benchmark-cg2300-pts-streamOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2658 v4 @ 2.30GHz (28 Cores / 56 Threads)Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-2400MT/s Micron 18ASF2G72PDZ-2G3B11199GB RS3YCMatrox MGA G200e [Pilot]6 x Intel I350 + 4 x Intel X710 for 10GbE SFP+ + 2 x Intel X550 + 8 x Intel X550 Virtual FunctionRocky Linux 8.104.18.0-553.8.1.el8_10.x86_64 (x86_64)GCC 8.5.0 20210514xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionBenchmark-cg2300-pts-stream PerformanceSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000017- SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

benchmark-cg2300-pts-streamstream: Copystream: Scalestream: Triadstream: Add8 x 16 GB DDR4-2400MT59992.233083.735411.035501.4OpenBenchmarking.org

Stream

This is a benchmark of Stream, the popular system memory (RAM) benchmark. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Type: Copy8 x 16 GB DDR4-2400MT13K26K39K52K65KSE +/- 349.29, N = 559992.2

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Type: Scale8 x 16 GB DDR4-2400MT7K14K21K28K35KSE +/- 176.00, N = 533083.7

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Type: Triad8 x 16 GB DDR4-2400MT8K16K24K32K40KSE +/- 227.40, N = 535411.0

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Type: Add8 x 16 GB DDR4-2400MT8K16K24K32K40KSE +/- 250.84, N = 535501.4