1_amd_go
VMware testing on Ubuntu 18.04 via the Phoronix Test Suite.
1_amd_go
Processor: 8 x AMD EPYC 7542 32-Core (15 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 17GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 18.04, Kernel: 4.15.0-101-generic (x86_64), OpenGL: 3.3 Mesa 19.2.8 (LLVM 9.0 128 bits), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x8301038
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
1_ox1-go
Processor: 8 x Intel Xeon Gold 6146 (15 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 17GB Virtual disk, Graphics: llvmpipe 16GB, Network: VMware VMXNET3
OS: Ubuntu 18.04, Kernel: 4.15.0-101-generic (x86_64), OpenGL: 3.3 Mesa 19.2.8 (LLVM 9.0 256 bits), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x2000065
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
Go Benchmarks
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
1_amd_go
Processor: 8 x AMD EPYC 7542 32-Core (15 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 17GB Virtual disk, Graphics: VMware SVGA II, Network: VMware VMXNET3
OS: Ubuntu 18.04, Kernel: 4.15.0-101-generic (x86_64), OpenGL: 3.3 Mesa 19.2.8 (LLVM 9.0 128 bits), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x8301038
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 18:06 by user tdcadmin.
1_ox1-go
Processor: 8 x Intel Xeon Gold 6146 (15 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 17GB Virtual disk, Graphics: llvmpipe 16GB, Network: VMware VMXNET3
OS: Ubuntu 18.04, Kernel: 4.15.0-101-generic (x86_64), OpenGL: 3.3 Mesa 19.2.8 (LLVM 9.0 256 bits), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Processor Notes: CPU Microcode: 0x2000065
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 27 May 2020 18:14 by user tdcadmin.