https://developer.amd.com/wordpress/media/2012/10/building_speccpu.html

Building SPEC CPU2006

This file documents the use of the x86 Open64 Compiler Suite.

2009 Advanced Micro Devices, Inc.

 
 

Building SPEC CPU2006

CPU2006 is SPEC's current-generation processor benchmark suite that stresses a system's processor, memory subsystem and compiler. SPEC designed CPU2006 to provide a comparative measure of compute-intensive performance across the widest practical range of hardware using workloads developed from real user applications. These benchmarks are provided as source code and require the user to be comfortable using compiler commands as well as other commands via a command interpreter using a console or command prompt window in order to generate executable binaries. The current version of the benchmark suite is V1.1, released in June 2008. In order to build and run SPEC CPU2006, you will need to download the benchmark kit, install it, then build and test the component programs. These steps, and any known limitations, are described in the sections below.

The URL for the home page for this benchmark suite is SPEC CPU2006.

Download: In order to download the SPEC CPU2006 benchmarks, a license is required.  An online order form can be found here.  Once SPEC membership has been acquired, the benchmark kit can be downloaded from https://pro.spec.org/private/osg/cpu/cpu2006/src/cpu2006-1.1.tar.bz2.  This site is password protected.

Installing the Kit

By convention, create a local directory on the system where you will build the benchmarks and run them called “CPU2006”.  In that directory, excute the following commands:

>bzcat cpu2006-1.1.tar.bz2 | tar xvf –

>./install.sh

Enter “yes” to the prompt.  Once complete, see the “Docs” subdirectory, which includes html format documentation on the SPEC harness and how to use it.

Building SPEC CPU2006

Building SPEC benchmarks is done using the SPEC harness.  The first command to execute in the CPU2006 directory is:

>. ./shrc

This will set the value of the $SPEC environment variable to the directory CPU2006.  The commands provided by the SPEC harness can be found in $SPEC/bin.  Example configuration files can be found in $SPEC/config.

The configuration file is used to specify the compiler invocation command, libraries to be used, compiler flags for each benchmark, etc.  This “config” file is also updated with MD5 checksums so that flag changes can be detected by the harness and benchmarks rebuilt only as needed.  More information on how the MD5 checksums are used can be found in the SPEC documentation.

The documentation also describes the SPEC run and reporting rules.  A “reportable” SPEC run is one that is suitable for submission to SPEC and eligible to be displayed on their results web pages.  Reportable runs must follow strict requirements for documentation, MD5 checksums, and must run each individual benchmark program three times.  However, it is also possible to do a non-reportable run with much less time and effort.

An example configuration file for building and running the SPEC benchmarks can be found in Example-open64.cfg.  This file assumes the Barcelona microarchitecture and is configured for a single-core target run with no auto-parallelization.  However, it is very similar to actual configuration files used for published SPEC results.  You can issue the following command to build and run all of the SPEC benchmarks using this configuration file:

     >runspec --loose --size=ref --iterations=1 --config=Example-open64 all

See the SPEC documentation for more details on the “runspec” command.  Below is a variation of the above command which limits the building and running to a single named benchmark, and only using the BASE flags.

     >runspec --loose --size=ref --iterations=1 --config=Example-open64 --tune=base perlbench
 
It is also possible to build the SPEC benchmarks without running them. Adding the option “—action=build” will build but not run the specified benchmarks.
It is also possible to “bundle” the resulting benchmark binaries and configuration file so they can be transported to a second system and executed there.
Please see the SPEC documentation for more details on these advanced features.
 

Known Limitations

There are no known limitations.

Building SPEC CPU2006的更多相关文章

  1. SPEC CPU2006的安装和使用

    https://www.spec.org/download.html http://blog.lazzzy.xyz/2017/09/15/SPEC_CPU2006/ BenchMark SPEC CP ...

  2. spec cpu2006 官网

    https://www.spec.org/cpu2006/Docs/install-guide-unix.html

  3. 【转载】]基于RedHatEnterpriseLinux V7(RHEL7)下SPEC CPU 2006环境搭建以及测试流程 介绍、安装准备、安装、config文件以及运行脚本介绍

    https://www.codetd.com/article/1137423 <版权声明:本文为博主原创文章,未经博主允许不得转载> 本次利用SPECCPU2006测试工具来进行Intel ...

  4. 【转载】基于RedHatEnterpriseLinux V7(RHEL7)下SPEC CPU 2006环境搭建以及测试流程(之一)——介绍、安装准备、安装、config文件以及运行脚本介绍

    基于RedHatEnterpriseLinux V7(RHEL7)下SPEC CPU 2006环境搭建以及测试流程(之一)--介绍.安装准备.安装.config文件以及运行脚本介绍 其他 2018-0 ...

  5. kvm 性能调优

    CPU Tuning Cache share tuning 对于物理 CPU,同一个 core 的 threads 共享 L2 Cache,同一个 socket 的 cores 共享 L3 cache ...

  6. 转-4年!我对OpenStack运维架构的总结

    4年!我对OpenStack运维架构的总结 原创: 徐超 云技术之家 今天 前言 应“云技术社区”北极熊之邀,写点东西.思来想去云计算范畴实在广泛,自然就聊点最近话题异常火热,让广大云计算从业者爱之深 ...

  7. 网易OpenStack部署运维实战

    OpenStack自2010年项目成立以来,已经有超过200个公司加入了 OpenStack 项目,目前参与 OpenStack 项目的开发人员有 17,000+,而且这些数字还在增加,作为一个开源的 ...

  8. [转帖]你不曾见过的国产CPU:可能是最全的龙芯系列芯片家谱(下)

    你不曾见过的国产CPU:可能是最全的龙芯系列芯片家谱(下) https://www.ijiwei.com/html/news/newsdetail?source=pc&news_id=7177 ...

  9. [知乎]这可能是最全面的龙芯3A3000处理器评测

    这可能是最全面的龙芯3A3000处理器评测 第一千零一个人   已关注 蓬岸 Dr.Quest . https://zhuanlan.zhihu.com/p/50716952 这里面链接很全. 立党 ...

随机推荐

  1. Istio安全-证书管理(实操一)

    Istio安全-证书管理 目录 Istio安全-证书管理 插入现有CA证书 插入现有证书和密钥 部署Istio 配置示例services 校验证书 卸载 Istio的DNS证书管理 DNS证书的提供和 ...

  2. Echarts4.x雷达图如何展示一维数据?

    最近做的项目其中一个功能是画雷达图,鼠标滑过雷达图的拐点,展示该维相关数据,并且需要显示雷达图的刻度. 但是我发现单纯的雷达图似乎没办法展示一维数据. 我总结了一下,关于画雷达图,我遇到的难点有三个: ...

  3. OOUnit4Summary

    一.前三次作业的架构设计 前言 第四单元以uml建模语言为背景,让我们通过已有的模型架构,设计实现类图(顺序图,状态图)解析器:在理解uml整体架构体系的基础上,读懂并熟练运用官方的给的代码,设计有层 ...

  4. XSS-change通关历程

    Level1:没有过滤. <script>alert(1)</script> <svg/onload=alert(1)> <script>confirm ...

  5. 2021年HW0day-奇安信 网康下一代防火墙 RCE漏洞细节

    漏洞信息: 漏洞名称:奇安信 网康下一代防火墙 RCE漏洞. 漏洞性质:远程命令执行 漏洞利用特点:命令执行之后没有回显 利用方式:防火墙使用linux进行开发的,可以使用echo xxx >1 ...

  6. Go 包管理与依赖查找顺序

    目录 1. 规则: 2. 编译时的依赖包查找机制 3.vendor vendor的层级搜索 4. modules 1. 规则: 同一目录下只能存在一个包 目录和目录下源文件的包命名可以不同 当包名与目 ...

  7. 【Azure Redis 缓存 Azure Cache For Redis】Redis连接池

    问题描述 Redis根据定价层说明,不同级别支持的连接数最多可达4万(同时),但是当短时间又大量连接请求建立的时候,Redis服务的服务压力非常大,到达100%.严重影响了高响应的要求.最严重时,经常 ...

  8. Unix ls UVA - 400

      The computer company you work for is introducing a brand new computer line and is developing a new ...

  9. Word 查找和替换字符串方法

    因为项目需要通过word模板替换字符串 ,来让用户下载word, 就在网上找了找word查找替换字符串的库或方法,基本上不是收费,就是无实现,或者方法局限性太大 .docx 是通过xml来存储文字和其 ...

  10. 【全网首发】鸿蒙开源三方组件--强大的弹窗库XPopup组件

    目录: 1.介绍 2.效果一览 3.依赖 4.如何使用 5.下载链接 6.<鸿蒙开源三方组件>文章合集 1. 介绍 ​ XPopup是一个弹窗库,可能是Harmony平台最好的弹窗库.它从 ...