docker testing on Ubuntu 22.04.4 LTS via the Phoronix Test Suite.
Processor: Intel Xeon Platinum 8259CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 t3.xlarge (1.0 BIOS), Memory: 16GB, Disk: 107GB Amazon Elastic Block Store
OS: Ubuntu 22.04.4 LTS, Kernel: 4.14.350-266.564.amzn2.x86_64 (x86_64), Compiler: GCC 11.4.0, File-System: overlayfs, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003707
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test profile measures how long it takes to complete several reference GNU Octave files via octave-benchmark. GNU Octave is used for numerical computations and is an open-source alternative to MATLAB. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8259CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 t3.xlarge (1.0 BIOS), Memory: 16GB, Disk: 107GB Amazon Elastic Block Store
OS: Ubuntu 22.04.4 LTS, Kernel: 4.14.350-266.564.amzn2.x86_64 (x86_64), Compiler: GCC 11.4.0, File-System: overlayfs, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003707
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 August 2024 13:48 by user flexlab-user.