cc20assignment2
Xen HVM domU 4.2.amazon testing on Amazon Linux AMI 2018.03 via the Phoronix Test Suite.
c5.xlarge
Processor: Intel Xeon Platinum 8275CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5002f00
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
m4.large
Processor: Intel Xeon E5-2686 v4 (1 Core / 2 Threads), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 8GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, System Layer: Xen HVM domU 4.2.amazon
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xb000038
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Loopback TCP Network Performance
This test measures the loopback network adapter performance using a micro-benchmark to measure the TCP performance. Learn more via the OpenBenchmarking.org test page.
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
LAME MP3 Encoding
LAME is an MP3 encoder licensed under the LGPL. This test measures the time required to encode a WAV file to MP3 format. Learn more via the OpenBenchmarking.org test page.
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
Apache Benchmark
This is a test of ab, which is the Apache benchmark program. This test profile measures how many requests per second a given system can sustain when carrying out 1,000,000 requests with 100 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
c5.xlarge
Processor: Intel Xeon Platinum 8275CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4
Kernel Notes: nvme_core.io_timeout=4294967295
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x5002f00
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 7 April 2020 20:34 by user saimanoj123.
m4.large
Processor: Intel Xeon E5-2686 v4 (1 Core / 2 Threads), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 8GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux AMI 2018.03, Kernel: 4.14.171-105.231.amzn1.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, System Layer: Xen HVM domU 4.2.amazon
Compiler Notes: --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xb000038
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 8 April 2020 13:34 by user saimanoj123.