cvm.m6.4xlarge128-botan cvm.m6.4xlarge128
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2201154-TJ-CVMM64XLA96 cvm.m6.4xlarge128 Processor: Intel Xeon Platinum 8374C (16 Cores), Motherboard: Tencent Cloud CVM v3.0 (seabios-1.9.1-qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8 x 16 GB RAM Smdbmds, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: TencentOS Server 3.1, Kernel: 5.4.119-19-0008 (x86_64), Compiler: GCC 8.4.1 20200928 + Clang 11.0.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: neverCompiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driverProcessor Notes: CPU Microcode: 0x1Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
cvm.m6.4xlarge128-botan OpenBenchmarking.org Phoronix Test Suite Intel Xeon Platinum 8374C (16 Cores) Tencent Cloud CVM v3.0 (seabios-1.9.1-qemu-project.org BIOS) Intel 440FX 82441FX PMC 8 x 16 GB RAM Smdbmds 50GB Cirrus Logic GD 5446 Red Hat Virtio device TencentOS Server 3.1 5.4.119-19-0008 (x86_64) GCC 8.4.1 20200928 + Clang 11.0.0 ext4 KVM Processor Motherboard Chipset Memory Disk Graphics Network OS Kernel Compiler File-System System Layer Cvm.m6.4xlarge128-botan Benchmarks System Logs - Transparent Huge Pages: never - --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - CPU Microcode: 0x1 - itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Botan Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI cvm.m6.4xlarge128 16 32 48 64 80 SE +/- 0.05, N = 3 73.84 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI - Decrypt cvm.m6.4xlarge128 16 32 48 64 80 SE +/- 0.02, N = 3 70.91 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 cvm.m6.4xlarge128 1100 2200 3300 4400 5500 SE +/- 21.11, N = 3 5168.94 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 - Decrypt cvm.m6.4xlarge128 1100 2200 3300 4400 5500 SE +/- 22.86, N = 3 5168.70 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish cvm.m6.4xlarge128 60 120 180 240 300 SE +/- 1.51, N = 3 280.94 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish - Decrypt cvm.m6.4xlarge128 60 120 180 240 300 SE +/- 1.35, N = 3 282.43 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish cvm.m6.4xlarge128 80 160 240 320 400 SE +/- 0.16, N = 3 349.25 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish - Decrypt cvm.m6.4xlarge128 80 160 240 320 400 SE +/- 0.17, N = 3 347.12 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 cvm.m6.4xlarge128 30 60 90 120 150 SE +/- 0.47, N = 3 111.71 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 - Decrypt cvm.m6.4xlarge128 30 60 90 120 150 SE +/- 0.00, N = 3 112.26 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 cvm.m6.4xlarge128 130 260 390 520 650 SE +/- 0.24, N = 3 615.85 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 - Decrypt cvm.m6.4xlarge128 130 260 390 520 650 SE +/- 0.13, N = 3 610.41 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
cvm.m6.4xlarge128 Processor: Intel Xeon Platinum 8374C (16 Cores), Motherboard: Tencent Cloud CVM v3.0 (seabios-1.9.1-qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8 x 16 GB RAM Smdbmds, Disk: 50GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: TencentOS Server 3.1, Kernel: 5.4.119-19-0008 (x86_64), Compiler: GCC 8.4.1 20200928 + Clang 11.0.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: neverCompiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driverProcessor Notes: CPU Microcode: 0x1Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 January 2022 20:48 by user .