2 x Intel Xeon Gold 6138 testing with a Dell 01YM03 (2.22.2 BIOS) and Matrox G200eW3 on Ubuntu 24.04 via the Phoronix Test Suite.
Processor: 2 x Intel Xeon Gold 6138 @ 3.70GHz (40 Cores / 80 Threads), Motherboard: Dell 01YM03 (2.22.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 384GB, Disk: 124GB USB Flash Drive, Graphics: Matrox G200eW3, Monitor: L226WA, Network: 2 x Intel X550 + 2 x Intel I350 + 2 x Intel X710 for 10GbE SFP+
OS: Ubuntu 24.04, Kernel: 6.8.0-41-generic (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 24.0.9-0ubuntu0.1 (LLVM 17.0.6 256 bits), Compiler: GCC 13.2.0, File-System: overlayfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: 2 x Intel Xeon Gold 6138 @ 3.70GHz (40 Cores / 80 Threads), Motherboard: Dell 01YM03 (2.22.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 384GB, Disk: 124GB USB Flash Drive, Graphics: Matrox G200eW3, Monitor: L226WA, Network: 2 x Intel X550 + 2 x Intel I350 + 2 x Intel X710 for 10GbE SFP+
OS: Ubuntu 24.04, Kernel: 6.8.0-41-generic (x86_64), Desktop: GNOME Shell 46.0, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 24.0.9-0ubuntu0.1 (LLVM 17.0.6 256 bits), Compiler: GCC 13.2.0, File-System: overlayfs, Screen Resolution: 1680x1050
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 November 2024 10:56 by user ubuntu.