VMware testing on Ubuntu 22.04.4 LTS via the Phoronix Test Suite.
Processor: 12 x Intel Xeon Gold 6444Y (23 Cores), Motherboard: Intel 440BX (VMW71.00V.21100432.B64.2301110304 BIOS), Memory: 240GB, Disk: 268GB Virtual disk, Graphics: NVIDIA L40S-8C 8GB
OS: Ubuntu 22.04.4 LTS, Kernel: 5.14.0-284.64.1.el9_2.x86_64 (x86_64), Display Driver: NVIDIA, Compiler: GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: VMware
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x2b000571
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
This is a benchmark of PyTorch making use of pytorch-benchmark [https://github.com/LukasHedegaard/pytorch-benchmark]. Learn more via the OpenBenchmarking.org test page.
Processor: 12 x Intel Xeon Gold 6444Y (23 Cores), Motherboard: Intel 440BX (VMW71.00V.21100432.B64.2301110304 BIOS), Memory: 240GB, Disk: 268GB Virtual disk, Graphics: NVIDIA L40S-8C 8GB
OS: Ubuntu 22.04.4 LTS, Kernel: 5.14.0-284.64.1.el9_2.x86_64 (x86_64), Display Driver: NVIDIA, Compiler: GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: VMware
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x2b000571
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 May 2024 14:53 by user root.