c5.2xlarge amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2404241-NE-C52XLARGE45 c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge OpenBenchmarking.org Phoronix Test Suite Intel Xeon Platinum 8275CL (4 Cores / 8 Threads) Amazon EC2 c5.2xlarge (1.0 BIOS) Intel 440FX 82441FX PMC 1 x 16384 MB DDR4-2933MT/s 107GB Amazon Elastic Block Store Amazon Elastic Amazon Linux 2 5.10.214-202.855.amzn2.x86_64 (x86_64) GCC 7.3.1 20180712 xfs amazon Processor Motherboard Chipset Memory Disk Network OS Kernel Compiler File-System System Layer C5.2xlarge Benchmarks System Logs - Transparent Huge Pages: madvise - --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - CPU Microcode: 0x5003605 - gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge botan: KASUMI botan: KASUMI - Decrypt botan: AES-256 botan: AES-256 - Decrypt botan: Twofish botan: Twofish - Decrypt botan: Blowfish botan: Blowfish - Decrypt botan: CAST-256 botan: CAST-256 - Decrypt botan: ChaCha20Poly1305 botan: ChaCha20Poly1305 - Decrypt cachebench: Read cachebench: Write cachebench: Read / Modify / Write tjbench: Decompression Throughput mbw: Memory Copy - 128 MiB mbw: Memory Copy - 512 MiB mbw: Memory Copy - 1024 MiB mbw: Memory Copy - 4096 MiB mbw: Memory Copy, Fixed Block Size - 128 MiB mbw: Memory Copy, Fixed Block Size - 512 MiB mbw: Memory Copy, Fixed Block Size - 1024 MiB mbw: Memory Copy, Fixed Block Size - 4096 MiB openssl: SHA256 openssl: SHA512 openssl: RSA4096 openssl: RSA4096 openssl: ChaCha20 openssl: AES-128-GCM openssl: AES-256-GCM openssl: ChaCha20-Poly1305 smallpt: Global Illumination Renderer; 128 Samples c5.2xlarge 80.096 77.425 3363.045 3357.203 309.071 313.211 388.723 385.276 120.582 121.074 659.230 655.958 6851.513706 45463.763178 64763.709351 155.565382 4904.292 4807.461 4856.689 4821.716 4915.683 4816.540 4807.881 5115.686 1217377050 1360641167 1094.6 71542.0 20084168477 22117343230 16104247937 10325685522 27.906 OpenBenchmarking.org
Botan Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI c5.2xlarge 20 40 60 80 100 SE +/- 0.02, N = 3 80.10 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI - Decrypt c5.2xlarge 20 40 60 80 100 SE +/- 0.02, N = 3 77.43 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 c5.2xlarge 700 1400 2100 2800 3500 SE +/- 0.33, N = 3 3363.05 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 - Decrypt c5.2xlarge 700 1400 2100 2800 3500 SE +/- 0.73, N = 3 3357.20 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish c5.2xlarge 70 140 210 280 350 SE +/- 0.25, N = 3 309.07 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish - Decrypt c5.2xlarge 70 140 210 280 350 SE +/- 0.09, N = 3 313.21 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish c5.2xlarge 80 160 240 320 400 SE +/- 0.17, N = 3 388.72 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish - Decrypt c5.2xlarge 80 160 240 320 400 SE +/- 0.25, N = 3 385.28 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 c5.2xlarge 30 60 90 120 150 SE +/- 0.53, N = 3 120.58 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 - Decrypt c5.2xlarge 30 60 90 120 150 SE +/- 0.05, N = 3 121.07 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 c5.2xlarge 140 280 420 560 700 SE +/- 0.15, N = 3 659.23 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 - Decrypt c5.2xlarge 140 280 420 560 700 SE +/- 0.14, N = 3 655.96 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Write c5.2xlarge 10K 20K 30K 40K 50K SE +/- 23.40, N = 3 45463.76 MIN: 34919.42 / MAX: 53656.43 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Read / Modify / Write c5.2xlarge 14K 28K 42K 56K 70K SE +/- 88.10, N = 3 64763.71 MIN: 55399.45 / MAX: 70054.95 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 6.02, N = 3 4807.46 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 23.94, N = 3 4856.69 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 4096 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 5.49, N = 3 4821.72 1. (CC) gcc options: -O3 -march=native
Test: Memory Copy - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 128 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 21.15, N = 3 4915.68 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 60.15, N = 4 4816.54 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 19.95, N = 3 4807.88 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 4096 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 38.26, N = 11 5115.69 1. (CC) gcc options: -O3 -march=native
Test: Memory Copy, Fixed Block Size - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
OpenSSL OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA256 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 1471264.75, N = 3 1217377050 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA512 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 224616.03, N = 3 1360641167 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org sign/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 200 400 600 800 1000 SE +/- 0.35, N = 3 1094.6 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org verify/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 15K 30K 45K 60K 75K SE +/- 33.29, N = 3 71542.0 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20 c5.2xlarge 4000M 8000M 12000M 16000M 20000M SE +/- 108080453.56, N = 3 20084168477 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-128-GCM c5.2xlarge 5000M 10000M 15000M 20000M 25000M SE +/- 3212276.80, N = 3 22117343230 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-256-GCM c5.2xlarge 3000M 6000M 9000M 12000M 15000M SE +/- 600468.69, N = 3 16104247937 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20-Poly1305 c5.2xlarge 2000M 4000M 6000M 8000M 10000M SE +/- 88801927.33, N = 12 10325685522 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
Smallpt Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org Seconds, Fewer Is Better Smallpt 1.0 Global Illumination Renderer; 128 Samples c5.2xlarge 7 14 21 28 35 SE +/- 0.05, N = 3 27.91 1. (CXX) g++ options: -fopenmp -O3
c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 April 2024 08:37 by user .