OpenVKL Xeon Gold 6226R
Intel Xeon Gold 6226R testing with a Supermicro X11SPL-F v1.02 (3.1 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
Intel Xeon Gold 6226R
Processor: Intel Xeon Gold 6226R @ 3.90GHz (16 Cores / 32 Threads), Motherboard: Supermicro X11SPL-F v1.02 (3.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 188GB, Disk: 3841GB Micron_9300_MTFDHAL3T8TDP, Graphics: ASPEED, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.6.0-999-generic (x86_64) 20200406, Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x500002c
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Mitigation of TSX disabled
OpenVKL
OpenVKL is the Intel Open Volume Kernel Library that offers high-performance volume computation kernels and part of the Intel oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Intel Xeon Gold 6226R
Processor: Intel Xeon Gold 6226R @ 3.90GHz (16 Cores / 32 Threads), Motherboard: Supermicro X11SPL-F v1.02 (3.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 188GB, Disk: 3841GB Micron_9300_MTFDHAL3T8TDP, Graphics: ASPEED, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.6.0-999-generic (x86_64) 20200406, Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x500002c
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 April 2020 07:05 by user phoronix.