amazon testing on Rocky 8.9 via the Phoronix Test Suite.
Processor: AMD EPYC 7R13 (8 Cores), Motherboard: Amazon EC2 c6a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 32GB, Disk: 2 x 107GB Amazon Elastic Block Store + 161GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Rocky 8.9, Kernel: 4.18.0-513.18.1.el8_9.x86_64 (x86_64), Display Server: X Server, Compiler: GCC 13.2.1 20231205, File-System: xfs, System Layer: amazon
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.max_retries=10 - Transparent Huge Pages: never
Processor Notes: CPU Microcode: 0xa0011d5
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test profile measures how long it takes to complete several reference GNU Octave files via octave-benchmark. GNU Octave is used for numerical computations and is an open-source alternative to MATLAB. Learn more via the OpenBenchmarking.org test page.
Processor: AMD EPYC 7R13 (8 Cores), Motherboard: Amazon EC2 c6a.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 32GB, Disk: 2 x 107GB Amazon Elastic Block Store + 161GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Rocky 8.9, Kernel: 4.18.0-513.18.1.el8_9.x86_64 (x86_64), Display Server: X Server, Compiler: GCC 13.2.1 20231205, File-System: xfs, System Layer: amazon
Kernel Notes: nvme_core.io_timeout=4294967295 nvme_core.max_retries=10 - Transparent Huge Pages: never
Processor Notes: CPU Microcode: 0xa0011d5
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 October 2024 22:20 by user davei.