arm
docker testing on Ubuntu 22.04.4 LTS via the Phoronix Test Suite.
M3Max_Ubuntu24.04
Processor: Apple (16 Cores), Memory: 8GB, Disk: 59GB
OS: Ubuntu 22.04.4 LTS, Kernel: 6.6.31-linuxkit (aarch64), Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: overlayfs, System Layer: docker
Kernel Notes: Transparent Huge Pages: always
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Numpy Benchmark
This is a test to obtain the general Numpy performance. Learn more via the OpenBenchmarking.org test page.
M3Max_Ubuntu24.04
Processor: Apple (16 Cores), Memory: 8GB, Disk: 59GB
OS: Ubuntu 22.04.4 LTS, Kernel: 6.6.31-linuxkit (aarch64), Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: overlayfs, System Layer: docker
Kernel Notes: Transparent Huge Pages: always
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 July 2024 16:31 by user root.