2 x Intel Xeon Gold 6330 testing with a inagile SA5280M6 (08.05.01 BIOS) and EFI VGA on Ubuntu 22.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xd0003d1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon Gold 6330 @ 3.10GHz (56 Cores / 112 Threads), Motherboard: inagile SA5280M6 (08.05.01 BIOS), Chipset: Intel Device 0998, Memory: 32 x 16 GB DDR4-2666MT/s Micron 18ASF2G72PDZ-2G6D1, Disk: 960GB SAMSUNG MZ7L3960, Graphics: EFI VGA, Network: 4 x Intel I350
OS: Ubuntu 22.04, Kernel: 5.19.0-41-generic (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xd0003d1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xd0003d1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 June 2024 06:50 by user root.
Processor: 2 x Intel Xeon Gold 6330 @ 3.10GHz (56 Cores / 112 Threads), Motherboard: inagile SA5280M6 (08.05.01 BIOS), Chipset: Intel Device 0998, Memory: 32 x 16 GB DDR4-2666MT/s Micron 18ASF2G72PDZ-2G6D1, Disk: 960GB SAMSUNG MZ7L3960, Graphics: EFI VGA, Network: 4 x Intel I350
OS: Ubuntu 22.04, Kernel: 5.19.0-41-generic (x86_64), File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xd0003d1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 June 2024 07:03 by user root.