AMD EPYC 7351P 16-Core testing with a TYAN S8026GM2NRE-HOV-B (V8.704 BIOS) and ASPEED on Ubuntu 20.10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD EPYC 7351P 16-Core @ 2.40GHz (16 Cores / 32 Threads), Motherboard: TYAN S8026GM2NRE-HOV-B (V8.704 BIOS), Chipset: AMD 17h, Memory: 8 x 16384 MB DDR4-2667MT/s HMA82GR7AFR8N-VK, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 20.10, Kernel: 5.8.0-48-generic (x86_64), File-System: ext4, Screen Resolution: 800x600
This is a benchmark of the Apache Cassandra NoSQL database management system making use of cassandra-stress. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 05:52 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 07:19 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 08:22 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 09:07 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 10:32 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 12:08 by user root.
Processor: AMD EPYC 7351P 16-Core @ 2.40GHz (16 Cores / 32 Threads), Motherboard: TYAN S8026GM2NRE-HOV-B (V8.704 BIOS), Chipset: AMD 17h, Memory: 8 x 16384 MB DDR4-2667MT/s HMA82GR7AFR8N-VK, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 20.10, Kernel: 5.8.0-48-generic (x86_64), File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 12:15 by user root.