c5.large amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2404239-NE-C5LARGE9496 c5.large Processor: Intel Xeon Platinum 8275CL (1 Core / 2 Threads), Motherboard: Amazon EC2 c5.large (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB DDR4-2933MT/s, Disk: 9GB Amazon Elastic Block Store + 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.large OpenBenchmarking.org Phoronix Test Suite Intel Xeon Platinum 8275CL (1 Core / 2 Threads) Amazon EC2 c5.large (1.0 BIOS) Intel 440FX 82441FX PMC 1 x 4096 MB DDR4-2933MT/s 9GB Amazon Elastic Block Store + 54GB Amazon Elastic Block Store Amazon Elastic Amazon Linux 2 5.10.214-202.855.amzn2.x86_64 (x86_64) GCC 7.3.1 20180712 xfs amazon Processor Motherboard Chipset Memory Disk Network OS Kernel Compiler File-System System Layer C5.large Benchmarks System Logs - Transparent Huge Pages: madvise - --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - CPU Microcode: 0x5003605 - gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.large byte: Dhrystone 2 sysbench: RAM / Memory sysbench: CPU intel-mlc: Idle Latency intel-mlc: Max Bandwidth - All Reads intel-mlc: Max Bandwidth - 3:1 Reads-Writes intel-mlc: Max Bandwidth - 2:1 Reads-Writes intel-mlc: Max Bandwidth - 1:1 Reads-Writes intel-mlc: Max Bandwidth - Stream-Triad Like intel-mlc: Peak Injection Bandwidth - All Reads intel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writes intel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writes intel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writes intel-mlc: Peak Injection Bandwidth - Stream-Triad Like cachebench: Read cachebench: Write cachebench: Read / Modify / Write gmpbench: Total Time compress-zstd: 3 - Compression Speed compress-zstd: 3 - Decompression Speed compress-zstd: 8 - Compression Speed compress-zstd: 8 - Decompression Speed compress-zstd: 12 - Compression Speed compress-zstd: 12 - Decompression Speed compress-zstd: 19 - Compression Speed compress-zstd: 19 - Decompression Speed compress-zstd: 3, Long Mode - Compression Speed compress-zstd: 3, Long Mode - Decompression Speed compress-zstd: 8, Long Mode - Compression Speed compress-zstd: 8, Long Mode - Decompression Speed compress-zstd: 19, Long Mode - Compression Speed compress-zstd: 19, Long Mode - Decompression Speed compress-lz4: 1 - Compression Speed compress-lz4: 1 - Decompression Speed compress-lz4: 3 - Compression Speed compress-lz4: 3 - Decompression Speed compress-lz4: 9 - Compression Speed compress-lz4: 9 - Decompression Speed openssl: SHA256 openssl: SHA512 openssl: RSA4096 openssl: RSA4096 openssl: ChaCha20 openssl: AES-128-GCM openssl: AES-256-GCM openssl: ChaCha20-Poly1305 botan: KASUMI botan: KASUMI - Decrypt botan: AES-256 botan: AES-256 - Decrypt botan: Twofish botan: Twofish - Decrypt botan: Blowfish botan: Blowfish - Decrypt botan: CAST-256 botan: CAST-256 - Decrypt botan: ChaCha20Poly1305 botan: ChaCha20Poly1305 - Decrypt c5.large 30697314.9 7435.86 1954.46 89.4 15307.69 18080.96 18351.45 21835.39 13130.11 15446.2 18104.1 17381.4 15505.1 13084.8 6830.263702 44878.619150 64677.214880 4465.8 229.1 880.3 59.7 928.4 25.6 880.9 2.84 756.8 185.7 934.8 57.9 937.6 2.55 723.0 496.70 2681.1 81.41 2493.9 28.52 2601.2 305215183 341403283 272.9 17951.9 5048447523 5528079747 4026034583 2646866648 80.015 77.360 3360.887 3356.472 308.870 312.604 388.598 385.037 120.996 120.528 658.432 654.352 OpenBenchmarking.org
OpenBenchmarking.org Events Per Second, More Is Better Sysbench 1.0.20 Test: CPU c5.large 400 800 1200 1600 2000 SE +/- 58.53, N = 15 1954.46 1. (CC) gcc options: -pthread -O2 -funroll-loops -rdynamic -ldl -laio -lm
Type: Scale
c5.large: The test quit with a non-zero exit status.
Type: Triad
c5.large: The test quit with a non-zero exit status.
Type: Add
c5.large: The test quit with a non-zero exit status.
Intel Memory Latency Checker Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org ns, Fewer Is Better Intel Memory Latency Checker 3.10 Test: Idle Latency c5.large 20 40 60 80 100 SE +/- 0.03, N = 3 89.4
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Write c5.large 10K 20K 30K 40K 50K SE +/- 22.67, N = 3 44878.62 MIN: 34581.27 / MAX: 53036.82 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Read / Modify / Write c5.large 14K 28K 42K 56K 70K SE +/- 117.61, N = 3 64677.21 MIN: 54913.82 / MAX: 69997.17 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MB/s, More Is Better Zstd Compression 1.5.4 Compression Level: 19, Long Mode - Compression Speed c5.large 0.5738 1.1476 1.7214 2.2952 2.869 SE +/- 0.04, N = 12 2.55 1. (CC) gcc options: -O3 -pthread -lz
OpenSSL OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA256 c5.large 70M 140M 210M 280M 350M SE +/- 44879.79, N = 3 305215183 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA512 c5.large 70M 140M 210M 280M 350M SE +/- 3051.68, N = 3 341403283 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org sign/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.large 60 120 180 240 300 SE +/- 1.03, N = 3 272.9 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org verify/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.large 4K 8K 12K 16K 20K SE +/- 21.94, N = 3 17951.9 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20 c5.large 1100M 2200M 3300M 4400M 5500M SE +/- 721682.83, N = 3 5048447523 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-128-GCM c5.large 1200M 2400M 3600M 4800M 6000M SE +/- 86848.64, N = 3 5528079747 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-256-GCM c5.large 900M 1800M 2700M 3600M 4500M SE +/- 553294.69, N = 3 4026034583 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20-Poly1305 c5.large 600M 1200M 1800M 2400M 3000M SE +/- 37397900.32, N = 12 2646866648 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
Botan Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI c5.large 20 40 60 80 100 SE +/- 0.01, N = 3 80.02 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI - Decrypt c5.large 20 40 60 80 100 SE +/- 0.02, N = 3 77.36 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 c5.large 700 1400 2100 2800 3500 SE +/- 0.82, N = 3 3360.89 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 - Decrypt c5.large 700 1400 2100 2800 3500 SE +/- 0.75, N = 3 3356.47 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish c5.large 70 140 210 280 350 SE +/- 0.03, N = 3 308.87 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish - Decrypt c5.large 70 140 210 280 350 SE +/- 0.08, N = 3 312.60 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish c5.large 80 160 240 320 400 SE +/- 0.20, N = 3 388.60 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish - Decrypt c5.large 80 160 240 320 400 SE +/- 0.12, N = 3 385.04 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 c5.large 30 60 90 120 150 SE +/- 0.05, N = 3 121.00 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 - Decrypt c5.large 30 60 90 120 150 SE +/- 0.44, N = 3 120.53 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 c5.large 140 280 420 560 700 SE +/- 0.44, N = 3 658.43 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 - Decrypt c5.large 140 280 420 560 700 SE +/- 0.59, N = 3 654.35 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
c5.large Processor: Intel Xeon Platinum 8275CL (1 Core / 2 Threads), Motherboard: Amazon EC2 c5.large (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB DDR4-2933MT/s, Disk: 9GB Amazon Elastic Block Store + 54GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 April 2024 03:05 by user .