before-xz
Intel Xeon Platinum 8168 testing with a Dell 060K5C (2.5.0 BIOS) and AMD Radeon Pro WX 2100 on Arch Linux via the Phoronix Test Suite.
Intel Xeon Platinum 8168
Processor: Intel Xeon Platinum 8168 @ 3.70GHz (24 Cores / 48 Threads), Motherboard: Dell 060K5C (2.5.0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 128GB, Disk: 1024GB Micron 1300 SATA + 2000GB Seagate ST2000DM001-1ER1 + 0GB SD/MMC CRW, Graphics: AMD Radeon Pro WX 2100, Audio: Realtek ALC3234, Monitor: DELL P2419H + DELL P2722H, Network: Intel I219-LM + Intel I210
OS: Arch Linux, Kernel: 6.6.21-1-avk (x86_64), Desktop: KDE Plasma 6.0.2, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.3-arch1.2 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 24.0.3-arch1.2, Compiler: GCC 13.2.1 20230801 + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: ext4, Screen Resolution: 3000x1920
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
Intel Xeon Platinum 8168
Processor: Intel Xeon Platinum 8168 @ 3.70GHz (24 Cores / 48 Threads), Motherboard: Dell 060K5C (2.5.0 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 128GB, Disk: 1024GB Micron 1300 SATA + 2000GB Seagate ST2000DM001-1ER1 + 0GB SD/MMC CRW, Graphics: AMD Radeon Pro WX 2100, Audio: Realtek ALC3234, Monitor: DELL P2419H + DELL P2722H, Network: Intel I219-LM + Intel I210
OS: Arch Linux, Kernel: 6.6.21-1-avk (x86_64), Desktop: KDE Plasma 6.0.2, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.3-arch1.2 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 24.0.3-arch1.2, Compiler: GCC 13.2.1 20230801 + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: ext4, Screen Resolution: 3000x1920
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 March 2024 23:24 by user avk.