2 x Intel Xeon Gold 6248R testing with a TYAN S7106GM2NR-HOV-B (V8.108 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: 2 x Intel Xeon Gold 6248R @ 4.00GHz (48 Cores / 96 Threads), Motherboard: TYAN S7106GM2NR-HOV-B (V8.108 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 16384 MB DDR4-3200MT/s Samsung M393A2K43DB3-CWE, Disk: 2 x 1920GB SAMSUNG MZQLB1T9HAJR-00007 + 2 x 480GB INTEL SSDSC2BB48, Graphics: ASPEED, Network: 2 x Mellanox MT27800 + 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-96-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Vulkan: 1.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x5003103
Java Notes: OpenJDK Runtime Environment (build 14.0.2+12-46)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon Gold 6248R @ 4.00GHz (48 Cores / 96 Threads), Motherboard: TYAN S7106GM2NR-HOV-B (V8.108 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 16384 MB DDR4-3200MT/s Samsung M393A2K43DB3-CWE, Disk: 2 x 1920GB SAMSUNG MZQLB1T9HAJR-00007 + 2 x 480GB INTEL SSDSC2BB48, Graphics: ASPEED, Network: 2 x Mellanox MT27800 + 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-96-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Vulkan: 1.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x5003103
Java Notes: OpenJDK Runtime Environment (build 14.0.2+12-46)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 22 January 2022 10:33 by user root.