Intel Xeon Platinum 8124M testing on Amazon Linux AMI 2018.03 via the Phoronix Test Suite.
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1000154
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Processor: Intel Xeon Platinum 8124M (18 Cores / 36 Threads), Motherboard: Amazon EC2 c5.9xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 70656MB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x2000069
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This is a test of t-test1 for basic memory allocator benchmarks. Note this test profile is currently very basic and the overall time does include the warmup time of the custom t-test1 compilation. Improvements welcome. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1000154
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 30 March 2020 14:42 by user .
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x1000154
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 30 March 2020 14:51 by user .
Processor: Intel Xeon Platinum 8124M (18 Cores / 36 Threads), Motherboard: Amazon EC2 c5.9xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 70656MB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x2000069
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 30 March 2020 15:12 by user .