Xen HVM domU 4.11.amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Processor: Intel Xeon E5-2686 v4 @ 3.00GHz (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.11.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 10240 MB RAM, Disk: 2 x 1900GB Amazon EC2 NVMe Instance Storage, Graphics: Cirrus Logic GD 5446, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.217-205.860.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.11.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Stream, the popular system memory (RAM) benchmark. Learn more via the OpenBenchmarking.org test page.
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
This is a benchmark of Sysbench with the built-in CPU and memory sub-tests. Sysbench is a scriptable multi-threaded benchmark tool based on LuaJIT. Learn more via the OpenBenchmarking.org test page.
This is a test of BYTE. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E5-2686 v4 @ 3.00GHz (8 Cores / 16 Threads), Motherboard: Xen HVM domU (4.11.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 16384 MB + 10240 MB RAM, Disk: 2 x 1900GB Amazon EC2 NVMe Instance Storage, Graphics: Cirrus Logic GD 5446, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.217-205.860.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: Xen HVM domU 4.11.amazon
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 7 June 2024 07:57 by user .