c5.2xlarge amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2404246-NE-C52XLARGE83 c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge OpenBenchmarking.org Phoronix Test Suite Intel Xeon Platinum 8275CL (4 Cores / 8 Threads) Amazon EC2 c5.2xlarge (1.0 BIOS) Intel 440FX 82441FX PMC 1 x 16384 MB DDR4-2933MT/s 107GB Amazon Elastic Block Store Amazon Elastic Amazon Linux 2 5.10.214-202.855.amzn2.x86_64 (x86_64) GCC 7.3.1 20180712 xfs amazon Processor Motherboard Chipset Memory Disk Network OS Kernel Compiler File-System System Layer C5.2xlarge Benchmarks System Logs - Transparent Huge Pages: madvise - --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - CPU Microcode: 0x5003605 - gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge botan: ChaCha20Poly1305 - Decrypt botan: ChaCha20Poly1305 botan: CAST-256 - Decrypt botan: CAST-256 botan: Blowfish - Decrypt botan: Blowfish botan: Twofish - Decrypt botan: Twofish botan: AES-256 - Decrypt botan: AES-256 botan: KASUMI - Decrypt botan: KASUMI openssl: ChaCha20-Poly1305 openssl: AES-256-GCM openssl: AES-128-GCM openssl: ChaCha20 openssl: RSA4096 openssl: RSA4096 openssl: SHA512 openssl: SHA256 cachebench: Read / Modify / Write cachebench: Write cachebench: Read mbw: Memory Copy, Fixed Block Size - 4096 MiB mbw: Memory Copy, Fixed Block Size - 1024 MiB mbw: Memory Copy, Fixed Block Size - 512 MiB mbw: Memory Copy, Fixed Block Size - 128 MiB mbw: Memory Copy - 4096 MiB mbw: Memory Copy - 1024 MiB mbw: Memory Copy - 512 MiB mbw: Memory Copy - 128 MiB mbw: Memory Copy - 8192 MiB c5.2xlarge 655.958 659.230 121.074 120.582 385.276 388.723 313.211 309.071 3357.203 3363.045 77.425 80.096 10325685522 16104247937 22117343230 20084168477 71542.0 1094.6 1360641167 1217377050 64763.709351 45463.763178 6851.513706 5115.686 4807.881 4816.540 4915.683 4821.716 4856.689 4807.461 4904.292 OpenBenchmarking.org
Botan Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 - Decrypt c5.2xlarge 140 280 420 560 700 SE +/- 0.14, N = 3 655.96 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: ChaCha20Poly1305 c5.2xlarge 140 280 420 560 700 SE +/- 0.15, N = 3 659.23 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 - Decrypt c5.2xlarge 30 60 90 120 150 SE +/- 0.05, N = 3 121.07 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: CAST-256 c5.2xlarge 30 60 90 120 150 SE +/- 0.53, N = 3 120.58 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish - Decrypt c5.2xlarge 80 160 240 320 400 SE +/- 0.25, N = 3 385.28 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Blowfish c5.2xlarge 80 160 240 320 400 SE +/- 0.17, N = 3 388.72 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish - Decrypt c5.2xlarge 70 140 210 280 350 SE +/- 0.09, N = 3 313.21 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: Twofish c5.2xlarge 70 140 210 280 350 SE +/- 0.25, N = 3 309.07 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 - Decrypt c5.2xlarge 700 1400 2100 2800 3500 SE +/- 0.73, N = 3 3357.20 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: AES-256 c5.2xlarge 700 1400 2100 2800 3500 SE +/- 0.33, N = 3 3363.05 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI - Decrypt c5.2xlarge 20 40 60 80 100 SE +/- 0.02, N = 3 77.43 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenBenchmarking.org MiB/s, More Is Better Botan 2.17.3 Test: KASUMI c5.2xlarge 20 40 60 80 100 SE +/- 0.02, N = 3 80.10 1. (CXX) g++ options: -fstack-protector -m64 -pthread -lbotan-2 -ldl -lrt
OpenSSL OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20-Poly1305 c5.2xlarge 2000M 4000M 6000M 8000M 10000M SE +/- 88801927.33, N = 12 10325685522 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-256-GCM c5.2xlarge 3000M 6000M 9000M 12000M 15000M SE +/- 600468.69, N = 3 16104247937 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-128-GCM c5.2xlarge 5000M 10000M 15000M 20000M 25000M SE +/- 3212276.80, N = 3 22117343230 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20 c5.2xlarge 4000M 8000M 12000M 16000M 20000M SE +/- 108080453.56, N = 3 20084168477 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org verify/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 15K 30K 45K 60K 75K SE +/- 33.29, N = 3 71542.0 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org sign/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 200 400 600 800 1000 SE +/- 0.35, N = 3 1094.6 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA512 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 224616.03, N = 3 1360641167 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA256 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 1471264.75, N = 3 1217377050 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Write c5.2xlarge 10K 20K 30K 40K 50K SE +/- 23.40, N = 3 45463.76 MIN: 34919.42 / MAX: 53656.43 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Read c5.2xlarge 1500 3000 4500 6000 7500 SE +/- 0.91, N = 3 6851.51 MIN: 6844.39 / MAX: 6853.83 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 19.95, N = 3 4807.88 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 60.15, N = 4 4816.54 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 128 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 21.15, N = 3 4915.68 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 4096 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 5.49, N = 3 4821.72 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 23.94, N = 3 4856.69 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 6.02, N = 3 4807.46 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 128 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 22.46, N = 3 4904.29 1. (CC) gcc options: -O3 -march=native
Test: Memory Copy, Fixed Block Size - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
Test: Memory Copy - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 April 2024 08:37 by user .