2 x Intel Xeon E5-2658 v4 testing with a Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS) and Matrox MGA G200e [Pilot] on Rocky Linux 8.10 via the Phoronix Test Suite.
Processor: 2 x Intel Xeon E5-2658 v4 @ 2.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2400MT/s Micron 18ASF2G72PDZ-2G3B1, Disk: 1199GB RS3YC, Graphics: Matrox MGA G200e [Pilot], Network: 6 x Intel I350 + 4 x Intel X710 for 10GbE SFP+ + 2 x Intel X550 + 8 x Intel X550 Virtual Function
OS: Rocky Linux 8.10, Kernel: 4.18.0-553.8.1.el8_10.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=64k,logbufs=8,nodev,noquota,nosuid,relatime,rw,seclabel,sunit=128,swidth=128 / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000017
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Dbench is a benchmark designed by the Samba project as a free alternative to netbench, but dbench contains only file-system calls for testing the disk performance. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2658 v4 @ 2.30GHz (28 Cores / 56 Threads), Motherboard: Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 8 x 16 GB DDR4-2400MT/s Micron 18ASF2G72PDZ-2G3B1, Disk: 1199GB RS3YC, Graphics: Matrox MGA G200e [Pilot], Network: 6 x Intel I350 + 4 x Intel X710 for 10GbE SFP+ + 2 x Intel X550 + 8 x Intel X550 Virtual Function
OS: Rocky Linux 8.10, Kernel: 4.18.0-553.8.1.el8_10.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Disk Notes: MQ-DEADLINE / attr2,inode64,logbsize=64k,logbufs=8,nodev,noquota,nosuid,relatime,rw,seclabel,sunit=128,swidth=128 / Block Size: 4096
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000017
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 7 September 2024 11:32 by user .