cc20assignment23

Xen HVM domU 4.2.amazon testing on Amazon Linux AMI 2018.03 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2004077-SAIM-CC20ASS17
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
t2.micro
April 07 2020
  6 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


cc20assignment23OpenBenchmarking.orgPhoronix Test SuiteIntel Xeon E5-2676 v3 (1 Core)Xen HVM domU (4.2.amazon BIOS)Intel 440FX 82441FX PMC1024MB8GBCirrus Logic GD 5446Amazon Linux AMI 2018.034.14.171-105.231.amzn1.x86_64 (x86_64)GCC 4.8.5 20150623ext4Xen HVM domU 4.2.amazonProcessorMotherboardChipsetMemoryDiskGraphicsOSKernelCompilerFile-SystemSystem LayerCc20assignment23 BenchmarksSystem Logs- --build=x86_64-amazon-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic - CPU Microcode: 0x43- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected

cc20assignment23stream: Addnetwork-loopback: Time To Transfer 10GB Via Loopbackjohn-the-ripper: Blowfishencode-mp3: WAV To MP3openssl: RSA 4096-bit Performancet2.micro8646.037.52393117.465119.3OpenBenchmarking.org

Stream

OpenBenchmarking.orgMB/s, More Is BetterStream 2013-01-17Type: Addt2.micro2K4K6K8K10KSE +/- 59.43, N = 198646.01. (CC) gcc options: -O3 -march=native -fopenmp

Loopback TCP Network Performance

This test measures the loopback network adapter performance using a micro-benchmark to measure the TCP performance. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterLoopback TCP Network PerformanceTime To Transfer 10GB Via Loopbackt2.micro918273645SE +/- 0.12, N = 337.52

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfisht2.micro20040060080010009311. (CC) gcc options: -O3 --param -std=gnu89

LAME MP3 Encoding

LAME is an MP3 encoder licensed under the LGPL. This test measures the time required to encode a WAV file to MP3 format. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterLAME MP3 Encoding 3.100WAV To MP3t2.micro48121620SE +/- 0.02, N = 317.471. (CC) gcc options: -O3 -ffast-math -funroll-loops -fschedule-insns2 -fbranch-count-reg -fforce-addr -pipe -lm

OpenSSL

OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSigns Per Second, More Is BetterOpenSSL 1.1.1RSA 4096-bit Performancet2.micro306090120150SE +/- 0.17, N = 3119.31. (CC) gcc options: -pthread -m64 -O3 -lcrypto -ldl