2 x AMD EPYC 9474F 48-Core testing with a ASUS K14PP-D24 (1002 BIOS) and ASPEED on Ubuntu 23.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa101135
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x AMD EPYC 9474F 48-Core @ 3.60GHz (96 Cores / 192 Threads), Motherboard: ASUS K14PP-D24 (1002 BIOS), Chipset: AMD Device 14a4, Memory: 24 x 32 GB DDR5-4800MT/s Samsung M321R4GA3BB6-CQKMG, Disk: 2000GB Samsung SSD 990 PRO 2TB + 2 x 7682GB Micron_9400_MTFDKCC7T6TGH + 2000GB PSSD T7 + 32GB Flash Drive + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: NVIDIA GM107 HD Audio, Monitor: DELL U2312HM, Network: 2 x Intel X710 for 10GBASE-T
OS: Ubuntu 23.04, Kernel: 6.1.53-gentoo-dist (x86_64), Display Server: X Server 1.21.1.7, Compiler: GCC 12.3.0 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 640x480
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
Test: Idle Latency
24 x 32 GB DDR5-4800MT: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa101135
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 September 2023 11:13 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa101135
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 September 2023 11:15 by user root.
Processor: 2 x AMD EPYC 9474F 48-Core @ 3.60GHz (96 Cores / 192 Threads), Motherboard: ASUS K14PP-D24 (1002 BIOS), Chipset: AMD Device 14a4, Memory: 24 x 32 GB DDR5-4800MT/s Samsung M321R4GA3BB6-CQKMG, Disk: 2000GB Samsung SSD 990 PRO 2TB + 2 x 7682GB Micron_9400_MTFDKCC7T6TGH + 2000GB PSSD T7 + 32GB Flash Drive + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: NVIDIA GM107 HD Audio, Monitor: DELL U2312HM, Network: 2 x Intel X710 for 10GBASE-T
OS: Ubuntu 23.04, Kernel: 6.1.53-gentoo-dist (x86_64), Display Server: X Server 1.21.1.7, Compiler: GCC 12.3.0 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 640x480
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa101135
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 September 2023 11:43 by user root.