KVM testing on AlibabaCloud 3 via the Phoronix Test Suite.
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.admin_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Processor: Intel Xeon Platinum 8475B (4 Cores / 8 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16 GB RAM, Disk: 43GB Alibaba Cloud Elastic Block Storage, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: AlibabaCloud 3, Kernel: 5.10.134-13.1.al8.x86_64 (x86_64), Compiler: GCC 10.2.1 20200825, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.admin_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 12 June 2023 02:27 by user .
Processor: Intel Xeon Platinum 8475B (4 Cores / 8 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16 GB RAM, Disk: 43GB Alibaba Cloud Elastic Block Storage, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: AlibabaCloud 3, Kernel: 5.10.134-13.1.al8.x86_64 (x86_64), Compiler: GCC 10.2.1 20200825, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.admin_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 12 June 2023 02:41 by user .