sys-large-aliyun
Processor: Intel Xeon Platinum 8269CA (32 Cores), Motherboard: Alibaba Cloud ECS (8c24b4c BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.36.2.el7.x86_64 (x86_64), Compiler: GCC 8.3.1 20190311, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Processor: Intel Xeon Platinum 8269CY (16 Cores / 32 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.99.1.el7.x86_64 (x86_64) 20230913, Compiler: GCC 8.3.1 20190311, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
iPerf is a network bandwidth throughput testing software. This test profile is used for automated testing of an iperf client and requires you have access to an iperf server. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Sysbench with the built-in CPU and memory sub-tests. Sysbench is a scriptable multi-threaded benchmark tool based on LuaJIT. Learn more via the OpenBenchmarking.org test page.
iPerf is a network bandwidth throughput testing software. This test profile is used for automated testing of an iperf client and requires you have access to an iperf server. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Sysbench with the built-in CPU and memory sub-tests. Sysbench is a scriptable multi-threaded benchmark tool based on LuaJIT. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8269CA (32 Cores), Motherboard: Alibaba Cloud ECS (8c24b4c BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.36.2.el7.x86_64 (x86_64), Compiler: GCC 8.3.1 20190311, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 28 November 2023 23:27 by user ptsadmin.
Processor: Intel Xeon Platinum 8269CY (16 Cores / 32 Threads), Motherboard: Alibaba Cloud ECS (449e491 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 4 x 16384 MB RAM, Disk: 20GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.99.1.el7.x86_64 (x86_64) 20230913, Compiler: GCC 8.3.1 20190311, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/opt/rh/devtoolset-8/root/usr/share/man --with-arch_32=x86-64 --with-default-libstdcxx-abi=gcc4-compatible --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic
Disk Notes: MQ-DEADLINE / data=ordered,relatime,rw / Block Size: 4096
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 30 November 2023 02:37 by user ptsadmin.