c5.2xlarge amazon testing on Amazon Linux 2 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2404248-NE-C52XLARGE37 c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge OpenBenchmarking.org Phoronix Test Suite Intel Xeon Platinum 8275CL (4 Cores / 8 Threads) Amazon EC2 c5.2xlarge (1.0 BIOS) Intel 440FX 82441FX PMC 1 x 16384 MB DDR4-2933MT/s 107GB Amazon Elastic Block Store Amazon Elastic Amazon Linux 2 5.10.214-202.855.amzn2.x86_64 (x86_64) GCC 7.3.1 20180712 xfs amazon Processor Motherboard Chipset Memory Disk Network OS Kernel Compiler File-System System Layer C5.2xlarge Benchmarks System Logs - Transparent Huge Pages: madvise - --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic - CPU Microcode: 0x5003605 - gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
c5.2xlarge openssl: ChaCha20-Poly1305 mbw: Memory Copy, Fixed Block Size - 4096 MiB openssl: RSA4096 openssl: RSA4096 openssl: SHA256 openssl: AES-256-GCM openssl: AES-128-GCM openssl: ChaCha20 openssl: SHA512 cachebench: Read cachebench: Read / Modify / Write cachebench: Write mbw: Memory Copy - 4096 MiB mbw: Memory Copy, Fixed Block Size - 1024 MiB mbw: Memory Copy - 1024 MiB mbw: Memory Copy, Fixed Block Size - 512 MiB mbw: Memory Copy - 512 MiB mbw: Memory Copy - 128 MiB mbw: Memory Copy, Fixed Block Size - 128 MiB c5.2xlarge 10325685522 5115.686 71542.0 1094.6 1217377050 16104247937 22117343230 20084168477 1360641167 6851.513706 64763.709351 45463.763178 4821.716 4807.881 4856.689 4816.540 4807.461 4904.292 4915.683 OpenBenchmarking.org
OpenSSL OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20-Poly1305 c5.2xlarge 2000M 4000M 6000M 8000M 10000M SE +/- 88801927.33, N = 12 10325685522 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenSSL OpenBenchmarking.org verify/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 15K 30K 45K 60K 75K SE +/- 33.29, N = 3 71542.0 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org sign/s, More Is Better OpenSSL 3.3 Algorithm: RSA4096 c5.2xlarge 200 400 600 800 1000 SE +/- 0.35, N = 3 1094.6 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA256 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 1471264.75, N = 3 1217377050 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-256-GCM c5.2xlarge 3000M 6000M 9000M 12000M 15000M SE +/- 600468.69, N = 3 16104247937 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: AES-128-GCM c5.2xlarge 5000M 10000M 15000M 20000M 25000M SE +/- 3212276.80, N = 3 22117343230 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: ChaCha20 c5.2xlarge 4000M 8000M 12000M 16000M 20000M SE +/- 108080453.56, N = 3 20084168477 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.3 Algorithm: SHA512 c5.2xlarge 300M 600M 900M 1200M 1500M SE +/- 224616.03, N = 3 1360641167 1. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Read / Modify / Write c5.2xlarge 14K 28K 42K 56K 70K SE +/- 88.10, N = 3 64763.71 MIN: 55399.45 / MAX: 70054.95 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MB/s, More Is Better CacheBench Test: Write c5.2xlarge 10K 20K 30K 40K 50K SE +/- 23.40, N = 3 45463.76 MIN: 34919.42 / MAX: 53656.43 1. (CC) gcc options: -O3 -lrt
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 19.95, N = 3 4807.88 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 1024 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 23.94, N = 3 4856.69 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 60.15, N = 4 4816.54 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 512 MiB c5.2xlarge 1000 2000 3000 4000 5000 SE +/- 6.02, N = 3 4807.46 1. (CC) gcc options: -O3 -march=native
Test: Memory Copy - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
Test: Memory Copy, Fixed Block Size - Array Size: 8192 MiB
c5.2xlarge: The test quit with a non-zero exit status.
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy - Array Size: 128 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 22.46, N = 3 4904.29 1. (CC) gcc options: -O3 -march=native
OpenBenchmarking.org MiB/s, More Is Better MBW 2018-09-08 Test: Memory Copy, Fixed Block Size - Array Size: 128 MiB c5.2xlarge 1100 2200 3300 4400 5500 SE +/- 21.15, N = 3 4915.68 1. (CC) gcc options: -O3 -march=native
c5.2xlarge Processor: Intel Xeon Platinum 8275CL (4 Cores / 8 Threads), Motherboard: Amazon EC2 c5.2xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 16384 MB DDR4-2933MT/s, Disk: 107GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 5.10.214-202.855.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madviseCompiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --enable-libatomic --enable-libcilkrts --enable-libitm --enable-libmpx --enable-libquadmath --enable-libsanitizer --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=genericProcessor Notes: CPU Microcode: 0x5003605Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 April 2024 08:37 by user .