Bench Docker
container-other testing on Debian GNU/Linux 10 via the Phoronix Test Suite.
Docker Alpine m5xlarge
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: Alpine Linux v3.12 3.12.0, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 9.3.0, File-System: overlayfs, System Layer: Docker
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-fixed-point --disable-libmpx --disable-libmudflap --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-cloog-backend --enable-default-pie --enable-default-ssp --enable-languages=c,c++,d,objc,fortran,ada --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Python Notes: Python 2.7.18 + Python 3.8.3
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Docker Debian m5xlarge
OS: Debian GNU/Linux 10, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 8.3.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Compile Bench
Compilebench tries to age a filesystem by simulating some of the disk IO common in creating, compiling, patching, stating and reading kernel trees. It indirectly measures how well filesystems can maintain directory locality as the disk fills up and directories age. This current test is setup to use the makej mode with 10 initial directories Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
NGINX Benchmark
This is a test of ab, which is the Apache Benchmark program running against nginx. This test profile measures how many requests per second a given system can sustain when carrying out 2,000,000 requests with 500 requests being carried out concurrently. Learn more via the OpenBenchmarking.org test page.
SQLite
Learn more via the OpenBenchmarking.org test page.
Gzip Compression
This test measures the time needed to archive/compress two copies of the Linux 4.13 kernel source tree using Gzip compression. Learn more via the OpenBenchmarking.org test page.
GnuPG
This test times how long it takes to encrypt a file using GnuPG. Learn more via the OpenBenchmarking.org test page.
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
SQLite
Learn more via the OpenBenchmarking.org test page.
Docker Alpine m5xlarge
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: Alpine Linux v3.12 3.12.0, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 9.3.0, File-System: overlayfs, System Layer: Docker
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-fixed-point --disable-libmpx --disable-libmudflap --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-cloog-backend --enable-default-pie --enable-default-ssp --enable-languages=c,c++,d,objc,fortran,ada --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Python Notes: Python 2.7.18 + Python 3.8.3
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 12 June 2020 21:51 by user root.
Docker Debian m5xlarge
Processor: Intel Xeon Platinum 8175M (2 Cores / 4 Threads), Motherboard: Amazon EC2 m5.xlarge (1.0 BIOS), Memory: 16GB, Disk: 9GB Amazon Elastic Block Store + 107GB Amazon Elastic Block Store
OS: Debian GNU/Linux 10, Kernel: 3.10.0-1127.10.1.el7.x86_64 (x86_64), Compiler: GCC 8.3.0, File-System: overlayfs, System Layer: container-other
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x2000069
Disk Scheduler Notes: NONE
Python Notes: Python 3.7.3
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 13 June 2020 12:40 by user root.