mantabork
2 x Intel Xeon Gold 6248R testing with a TYAN S7106GM2NR-HOV-B (V8.108 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
performance
Processor: 2 x Intel Xeon Gold 6248R @ 4.00GHz (48 Cores / 96 Threads), Motherboard: TYAN S7106GM2NR-HOV-B (V8.108 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 16384 MB DDR4-3200MT/s Samsung M393A2K43DB3-CWE, Disk: 2 x 1920GB SAMSUNG MZQLB1T9HAJR-00007 + 2 x 480GB INTEL SSDSC2BB48, Graphics: ASPEED, Network: 2 x Mellanox MT27800 + 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-96-generic (x86_64), Vulkan: 1.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x5003103
Java Notes: OpenJDK Runtime Environment (build 14.0.2+12-46)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Bork File Encrypter
Bork is a small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage. This test measures the amount of time it takes to encrypt a sample file. Learn more via the OpenBenchmarking.org test page.
performance
Processor: 2 x Intel Xeon Gold 6248R @ 4.00GHz (48 Cores / 96 Threads), Motherboard: TYAN S7106GM2NR-HOV-B (V8.108 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 16384 MB DDR4-3200MT/s Samsung M393A2K43DB3-CWE, Disk: 2 x 1920GB SAMSUNG MZQLB1T9HAJR-00007 + 2 x 480GB INTEL SSDSC2BB48, Graphics: ASPEED, Network: 2 x Mellanox MT27800 + 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-96-generic (x86_64), Vulkan: 1.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x5003103
Java Notes: OpenJDK Runtime Environment (build 14.0.2+12-46)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 23 January 2022 18:33 by user root.