mv-test
Intel Xeon D-2141I testing with a Supermicro X11SDV-8C-TLN2F v1.02 (1.1a BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
mv-test
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
mv-test-1
Processor: AMD EPYC 7351P 16-Core @ 2.40GHz (16 Cores / 32 Threads), Motherboard: TYAN S8026GM2NRE-HOV-B (V8.704 BIOS), Chipset: AMD 17h, Memory: 8 x 16384 MB DDR4-2667MT/s HMA82GR7AFR8N-VK, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 20.10, Kernel: 5.8.0-48-generic (x86_64), File-System: ext4, Screen Resolution: 800x600
mv-test-adv3
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x2006a08
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
mv-test-adv3-2
Processor: Intel Xeon D-2141I (8 Cores / 16 Threads), Motherboard: Supermicro X11SDV-8C-TLN2F v1.02 (1.1a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 2 x 16384 MB DDR4-2666MT/s 18ASF2G72PDZ-2G6E1, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel X722 for 10GBASE-T
OS: Ubuntu 20.04, Kernel: 5.8.0-49-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Apache Cassandra
This is a benchmark of the Apache Cassandra NoSQL database management system making use of cassandra-stress. Learn more via the OpenBenchmarking.org test page.
mv-test
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 April 2021 12:38 by user root.
mv-test-1
Processor: AMD EPYC 7351P 16-Core @ 2.40GHz (16 Cores / 32 Threads), Motherboard: TYAN S8026GM2NRE-HOV-B (V8.704 BIOS), Chipset: AMD 17h, Memory: 8 x 16384 MB DDR4-2667MT/s HMA82GR7AFR8N-VK, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel 10-Gigabit X540-AT2
OS: Ubuntu 20.10, Kernel: 5.8.0-48-generic (x86_64), File-System: ext4, Screen Resolution: 800x600
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8001230
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.10)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 April 2021 10:33 by user root.
mv-test-adv3
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x2006a08
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 13 April 2021 11:14 by user root.
mv-test-adv3-2
Processor: Intel Xeon D-2141I (8 Cores / 16 Threads), Motherboard: Supermicro X11SDV-8C-TLN2F v1.02 (1.1a BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 2 x 16384 MB DDR4-2666MT/s 18ASF2G72PDZ-2G6E1, Disk: 2 x 512GB Western Digital CL SN720 SDAQNTW-512G-2000, Graphics: ASPEED, Network: 2 x Intel X722 for 10GBASE-T
OS: Ubuntu 20.04, Kernel: 5.8.0-49-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x2006a08
Java Notes: OpenJDK Runtime Environment (build 11.0.10+9-Ubuntu-0ubuntu1.20.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Vulnerable
Testing initiated at 13 April 2021 13:00 by user root.