t2-vray
Intel Xeon Max 9480 testing with a Supermicro X13SEI-TF v1.01 (2.1 BIOS) and ASPEED on Ubuntu 23.10 via the Phoronix Test Suite.
a
Processor: Intel Xeon Max 9480 @ 3.50GHz (56 Cores / 112 Threads), Motherboard: Supermicro X13SEI-TF v1.01 (2.1 BIOS), Chipset: Intel Device 1bce, Memory: 256GB, Disk: 4001GB CT4000T700SSD5 + 1000GB Sabrent Rocket 4.0 1TB, Graphics: ASPEED, Network: 2 x Intel X550
OS: Ubuntu 23.10, Kernel: 6.5.0-27-generic (x86_64), Compiler: GCC 13.2.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: performance) - CPU Microcode: 0x2c000351
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Chaos Group V-RAY
a
Processor: Intel Xeon Max 9480 @ 3.50GHz (56 Cores / 112 Threads), Motherboard: Supermicro X13SEI-TF v1.01 (2.1 BIOS), Chipset: Intel Device 1bce, Memory: 256GB, Disk: 4001GB CT4000T700SSD5 + 1000GB Sabrent Rocket 4.0 1TB, Graphics: ASPEED, Network: 2 x Intel X550
OS: Ubuntu 23.10, Kernel: 6.5.0-27-generic (x86_64), Compiler: GCC 13.2.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: performance) - CPU Microcode: 0x2c000351
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 April 2024 22:47 by user don.