Tests for a future article. Intel Xeon E-2336 testing with a ASRockRack E3C252D4U (1.22 BIOS) and ASPEED on Ubuntu 22.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x59 - Thermald 2.4.9
Java Notes: OpenJDK Runtime Environment (build 11.0.20+8-post-Ubuntu-1ubuntu122.04)
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Xeon E-2336 @ 2.90GHz (6 Cores / 12 Threads), Motherboard: ASRockRack E3C252D4U (1.22 BIOS), Chipset: Intel Tiger Lake-H, Memory: 64GB, Disk: 3201GB Micron_7450_MTFDKCC3T2TFS, Graphics: ASPEED, Network: 2 x Intel I210
OS: Ubuntu 22.04, Kernel: 6.5.1-060501-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1024x768
This is a PingCAP TiDB Community Server benchmark facilitated using the sysbench OLTP database benchmarks. Learn more via the OpenBenchmarking.org test page.
Test: oltp_read_write - Threads: 32
a: The test quit with a non-zero exit status. E: FATAL: Thread initialization failed!
This is a benchmark of the Apache Hadoop making use of its built-in name-node throughput benchmark (NNThroughputBenchmark). Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x59 - Thermald 2.4.9
Java Notes: OpenJDK Runtime Environment (build 11.0.20+8-post-Ubuntu-1ubuntu122.04)
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 September 2023 11:24 by user phoronix.
Processor: Intel Xeon E-2336 @ 2.90GHz (6 Cores / 12 Threads), Motherboard: ASRockRack E3C252D4U (1.22 BIOS), Chipset: Intel Tiger Lake-H, Memory: 64GB, Disk: 3201GB Micron_7450_MTFDKCC3T2TFS, Graphics: ASPEED, Network: 2 x Intel I210
OS: Ubuntu 22.04, Kernel: 6.5.1-060501-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.21.1.4, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x59 - Thermald 2.4.9
Java Notes: OpenJDK Runtime Environment (build 11.0.20+8-post-Ubuntu-1ubuntu122.04)
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 September 2023 14:31 by user phoronix.