4 x Intel Xeon Gold 6130 testing with a Dell PowerEdge R940 [0D41HC] (2.15.1 BIOS) and Matrox G200eW3 on Debian GNU/Linux 11 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x2006e05
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: 4 x Intel Xeon Gold 6130 @ 3.70GHz (64 Cores / 128 Threads), Motherboard: Dell PowerEdge R940 [0D41HC] (2.15.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 24 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 1600GB Dell Flash PM1725b 1.6TB AIC + 1600GB Dell Flash NVMe PM1725 1.6TB AIC + 480GB INTEL SSDSC2KG480G7R, Graphics: Matrox G200eW3, Network: 4 x Intel X710 for 10GbE SFP+
OS: Debian GNU/Linux 11, Kernel: 6.1.38 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x2006e05
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 August 2023 23:39 by user root.
Processor: 4 x Intel Xeon Gold 6130 @ 3.70GHz (64 Cores / 128 Threads), Motherboard: Dell PowerEdge R940 [0D41HC] (2.15.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 24 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1, Disk: 1600GB Dell Flash PM1725b 1.6TB AIC + 1600GB Dell Flash NVMe PM1725 1.6TB AIC + 480GB INTEL SSDSC2KG480G7R, Graphics: Matrox G200eW3, Network: 4 x Intel X710 for 10GbE SFP+
OS: Debian GNU/Linux 11, Kernel: 6.1.38 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0x2006e05
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 August 2023 23:42 by user root.