KVM testing on AlibabaCloud 3 via the Phoronix Test Suite.
Processor: Intel Xeon Platinum 8475B (4 Cores / 8 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16 GB RAM, Disk: 43GB Alibaba Cloud Elastic Block Storage, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: AlibabaCloud 3, Kernel: 5.10.134-13.1.al8.x86_64 (x86_64), Compiler: GCC 10.2.1 20200825, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.admin_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
This test uses systemd-analyze to report the kernel boot time. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8475B (4 Cores / 8 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16 GB RAM, Disk: 43GB Alibaba Cloud Elastic Block Storage, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: AlibabaCloud 3, Kernel: 5.10.134-13.1.al8.x86_64 (x86_64), Compiler: GCC 10.2.1 20200825, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.admin_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 11 June 2023 21:59 by user .