amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Processor: Intel Xeon Platinum 8175M (8 Cores / 16 Threads), Motherboard: Amazon EC2 m5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 64 GB DDR4-2666MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.186-179.751.amzn2.x86_64 (x86_64), Compiler: GCC 10.4.1 20221124, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Vulnerable: Microcode update required + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
A simple C++ program that calculates Pi to 8,765,4321 digits using the Leibniz formula. This test can be used for showcasing how to write a basic test profile. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8175M (8 Cores / 16 Threads), Motherboard: Amazon EC2 m5.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 64 GB DDR4-2666MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.186-179.751.amzn2.x86_64 (x86_64), Compiler: GCC 10.4.1 20221124, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x2007006
Security Notes: gather_data_sampling: Vulnerable: Microcode update required + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 August 2023 01:35 by user .