Intel 0000% testing with a ASUS Pro WS W790E-SAGE SE (0215 BIOS) and ASPEED on Fedora 39 via the Phoronix Test Suite.
Processor: Intel 0000% @ 3.60GHz (18 Cores / 36 Threads), Motherboard: ASRockRack EPC621D8A (P2.10 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 80GB, Disk: 4001GB CT4000P3SSD8 + 124GB Ultra Fit, Graphics: ASPEED, Audio: Intel DG2 Audio, Network: 4 x Intel X722 for 1GbE
OS: Fedora Linux 39, Kernel: 6.6.6-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20231205 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x4003604
Security Notes: SELinux + gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2b0004d0
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Xeon w3-2423 @ 4.20GHz (6 Cores / 12 Threads), Motherboard: Supermicro X13SWA-TF v1.01 (2.0 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 8GB Cruzer Blade, Graphics: ASPEED, Audio: Realtek ALC888-VD, Network: Intel I210 + Aquantia AQC113C NBase-T/IEEE
OS: Fedora 39, Kernel: 6.6.11-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1024x768
Processor: Intel 0000% @ 3.30GHz (48 Cores / 96 Threads), Motherboard: ASUS Pro WS W790E-SAGE SE (0215 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: Realtek ALC1220, Network: 2 x Intel X710 for 10GBASE-T
OS: Fedora 39, Kernel: 6.6.11-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xd0004b1
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel 0000% @ 3.30GHz (48 Cores / 96 Threads), Motherboard: ASUS Pro WS W790E-SAGE SE (0215 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: Realtek ALC1220, Monitor: S23A950D, Network: 2 x Intel X710 for 10GBASE-T
OS: Fedora 39, Kernel: 6.7.7-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 3.0 + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xd0004b1
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
Processor: Intel 0000% @ 3.60GHz (18 Cores / 36 Threads), Motherboard: ASRockRack EPC621D8A (P2.10 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 80GB, Disk: 4001GB CT4000P3SSD8 + 124GB Ultra Fit, Graphics: ASPEED, Audio: Intel DG2 Audio, Network: 4 x Intel X722 for 1GbE
OS: Fedora Linux 39, Kernel: 6.6.6-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20231205 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x4003604
Security Notes: SELinux + gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 6 January 2024 22:30 by user buildbot.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2b0004d0
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 January 2024 05:41 by user buildbot.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2b0004d0
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 January 2024 06:20 by user buildbot.
Processor: Intel Xeon w3-2423 @ 4.20GHz (6 Cores / 12 Threads), Motherboard: Supermicro X13SWA-TF v1.01 (2.0 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 8GB Cruzer Blade, Graphics: ASPEED, Audio: Realtek ALC888-VD, Network: Intel I210 + Aquantia AQC113C NBase-T/IEEE
OS: Fedora 39, Kernel: 6.6.11-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2b0004d0
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 January 2024 06:47 by user buildbot.
Processor: Intel 0000% @ 3.30GHz (48 Cores / 96 Threads), Motherboard: ASUS Pro WS W790E-SAGE SE (0215 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: Realtek ALC1220, Network: 2 x Intel X710 for 10GBASE-T
OS: Fedora 39, Kernel: 6.6.11-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xd0004b1
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 March 2024 06:19 by user buildbot.
Processor: Intel 0000% @ 3.30GHz (48 Cores / 96 Threads), Motherboard: ASUS Pro WS W790E-SAGE SE (0215 BIOS), Chipset: Intel Alder Lake-S PCH, Memory: 64GB, Disk: 4001GB CT4000P3SSD8 + 0GB Virtual HDisk0, Graphics: ASPEED, Audio: Realtek ALC1220, Monitor: S23A950D, Network: 2 x Intel X710 for 10GBASE-T
OS: Fedora 39, Kernel: 6.7.7-200.fc39.x86_64 (x86_64), OpenCL: OpenCL 3.0 + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3 + OpenCL 3.0 LINUX + OpenCL 1.2 Intel FPGA SDK for OpenCL 20.3, Compiler: GCC 13.2.1 20231205 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xd0004b1
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 March 2024 01:01 by user mgolub2.