2022-06-12-1729
amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
c6i.4xlarge #1
Processor: Intel Xeon Platinum 8375C (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6i.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-3200MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xd000331
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c7g.4xlarge #1
Processor: ARMv8 Neoverse-V1 (16 Cores), Motherboard: Amazon EC2 c7g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
c4.4xlarge #1
Processor: Intel Xeon E5-2666 v3 (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.11.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 14336 MB RAM, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.11.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.4xlarge #1
Processor: Intel Xeon Platinum 8275CL (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x500320a
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5a.4xlarge #1
Changed Processor to AMD EPYC 7R32 (8 Cores / 16 Threads).
Changed Motherboard to Amazon EC2 c5a.4xlarge (1.0 BIOS).
Changed Memory to 1 x 32 GB DDR4-3200MT/s.
Processor Change: CPU Microcode: 0x830104d
Security Change: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c6a.4xlarge
Changed Processor to AMD EPYC 7R13 (8 Cores / 16 Threads).
Changed Motherboard to Amazon EC2 c6a.4xlarge (1.0 BIOS).
Changed Memory to 1 x 32 GB DDR4-2933MT/s.
Processor Change: CPU Microcode: 0xa001144
Security Change: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c6g.4xlarge #1
Processor: ARMv8 Neoverse-N1 (16 Cores), Motherboard: Amazon EC2 c6g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
c7g.4xlarge #2
Changed Processor to ARMv8 Neoverse-V1 (16 Cores).
Changed Motherboard to Amazon EC2 c7g.4xlarge (1.0 BIOS).
c6g.4xlarge #2
Changed Processor to ARMv8 Neoverse-N1 (16 Cores).
Changed Motherboard to Amazon EC2 c6g.4xlarge (1.0 BIOS).
c4.4xlarge #2
Processor: Intel Xeon E5-2666 v3 (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 14336 MB RAM, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.2.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.4xlarge #2
Processor: Intel Xeon Platinum 8275CL (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x500320a
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5a.4xlarge #2
Changed Processor to AMD EPYC 7R32 (8 Cores / 16 Threads).
Changed Motherboard to Amazon EC2 c5a.4xlarge (1.0 BIOS).
Processor Change: CPU Microcode: 0x8301025
Security Change: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c6i.4xlarge #2
Changed Processor to Intel Xeon Platinum 8375C (8 Cores / 16 Threads).
Changed Motherboard to Amazon EC2 c6i.4xlarge (1.0 BIOS).
Changed Memory to 1 x 32 GB DDR4-3200MT/s.
Processor Change: CPU Microcode: 0xd000331
Security Change: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
AMD EPYC 7R13
Changed Processor to AMD EPYC 7R13 (8 Cores / 16 Threads).
Changed Motherboard to Amazon EC2 c6a.4xlarge (1.0 BIOS).
Changed Memory to 1 x 32 GB DDR4-2933MT/s.
Processor Change: CPU Microcode: 0xa001144
Security Change: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
Apache HTTP Server
This is a test of the Apache HTTPD web server. This Apache HTTPD web server benchmark test profile makes use of the Golang "Bombardier" program for facilitating the HTTP requests over a fixed period time with a configurable number of concurrent clients. Learn more via the OpenBenchmarking.org test page.
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
C-Ray
This is a test of C-Ray, a simple raytracer designed to test the floating-point CPU performance. This test is multi-threaded (16 threads per core), will shoot 8 rays per pixel for anti-aliasing, and will generate a 1600 x 1200 image. Learn more via the OpenBenchmarking.org test page.
Dolfyn
Dolfyn is a Computational Fluid Dynamics (CFD) code of modern numerical simulation techniques. The Dolfyn test profile measures the execution time of the bundled computational fluid dynamics demos that are bundled with Dolfyn. Learn more via the OpenBenchmarking.org test page.
FFmpeg
This test uses FFmpeg for testing the system's audio/video encoding performance. Learn more via the OpenBenchmarking.org test page.
Redis
Redis is an open-source in-memory data structure store, used as a database, cache, and message broker. Learn more via the OpenBenchmarking.org test page.
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
CPU Usage (Summary) Monitor
Parallel BZIP2 Compression
This test measures the time needed to compress a file (FreeBSD-13.0-RELEASE-amd64-memstick.img) using Parallel BZIP2 compression. Learn more via the OpenBenchmarking.org test page.
c6i.4xlarge #1
Processor: Intel Xeon Platinum 8375C (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6i.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-3200MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xd000331
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:29 by user root.
c7g.4xlarge #1
Processor: ARMv8 Neoverse-V1 (16 Cores), Motherboard: Amazon EC2 c7g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:29 by user root.
c4.4xlarge #1
Processor: Intel Xeon E5-2666 v3 (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.11.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 14336 MB RAM, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.11.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:30 by user root.
c5.4xlarge #1
Processor: Intel Xeon Platinum 8275CL (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x500320a
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:30 by user root.
c5a.4xlarge #1
Processor: AMD EPYC 7R32 (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-3200MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x830104d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:30 by user root.
c6a.4xlarge
Processor: AMD EPYC 7R13 (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xa001144
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:30 by user root.
c6g.4xlarge #1
Processor: ARMv8 Neoverse-N1 (16 Cores), Motherboard: Amazon EC2 c6g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 June 2022 17:30 by user root.
c7g.4xlarge #2
Processor: ARMv8 Neoverse-V1 (16 Cores), Motherboard: Amazon EC2 c7g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:51 by user santosh.
c6g.4xlarge #2
Processor: ARMv8 Neoverse-N1 (16 Cores), Motherboard: Amazon EC2 c6g.4xlarge (1.0 BIOS), Chipset: Amazon Device 0200, Memory: 32GB, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.aarch64 (aarch64) 20220525, Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=aarch64-redhat-linux --disable-libcilkrts --disable-libmpx --disable-libquadmath --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libitm --enable-libsanitizer --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:53 by user root.
c4.4xlarge #2
Processor: Intel Xeon E5-2666 v3 (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 14336 MB RAM, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Intel 82599 Virtual Function
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.2.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:54 by user root.
c5.4xlarge #2
Processor: Intel Xeon Platinum 8275CL (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x500320a
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:54 by user root.
c5a.4xlarge #2
Processor: AMD EPYC 7R32 (8 Cores / 16 Threads), Motherboard: Amazon EC2 c5a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x8301025
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:54 by user root.
c6i.4xlarge #2
Processor: Intel Xeon Platinum 8375C (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6i.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-3200MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xd000331
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:55 by user root.
AMD EPYC 7R13
Processor: AMD EPYC 7R13 (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 32 GB DDR4-2933MT/s, Disk: 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.118-111.515.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0xa001144
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 June 2022 06:56 by user root.