Docker testing on Ubuntu 20.04.4 LTS via the Phoronix Test Suite.
Processor: AMD Ryzen Threadripper PRO 3955WX 16-Cores @ 3.90GHz (16 Cores / 32 Threads), Motherboard: ASUS Pro WS WRX80E-SAGE SE WIFI (0602 BIOS), Chipset: AMD Starship/Matisse, Memory: 256GB, Disk: 4 x 2000GB Samsung SSD 970 EVO Plus 2TB + 1000GB Samsung SSD 970 EVO Plus 1TB + 500GB Western Digital WDS500G2B0B, Graphics: ASPEED 16GB (2450MHz), Audio: Intel Device 4f92, Monitor: 2 x DELL U2312HM + 28E850, Network: 2 x Intel 10G X550T
OS: Ubuntu 20.04.4 LTS, Kernel: 6.2.0-1275.native (x86_64), OpenCL: OpenCL 3.0 + OpenCL 2.1 AMD-APP (3513.0), Compiler: GCC 11.3.0 + LLVM 15.0.3, File-System: overlayfs, Screen Resolution: 1920x1080, System Layer: Docker
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff amdgpu.vm_block_size=10 amdgpu.vm_size=1024 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-serialization=2 --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-11-xKiWfi/gcc-11-11.3.0/debian/tmp-nvptx/usr,amdgcn-amdhsa=/build/gcc-11-xKiWfi/gcc-11-11.3.0/debian/tmp-gcn/usr --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8301055
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
QuantLib is an open-source library/framework around quantitative finance for modeling, trading and risk management scenarios. QuantLib is written in C++ with Boost and its built-in benchmark used reports the QuantLib Benchmark Index benchmark score. Learn more via the OpenBenchmarking.org test page.
FinanceBench is a collection of financial program benchmarks with support for benchmarking on the GPU via OpenCL and CPU benchmarking with OpenMP. The FinanceBench test cases are focused on Black-Sholes-Merton Process with Analytic European Option engine, QMC (Sobol) Monte-Carlo method (Equity Option Example), Bonds Fixed-rate bond with flat forward curve, and Repo Securities repurchase agreement. FinanceBench was originally written by the Cavazos Lab at University of Delaware. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen Threadripper PRO 3955WX 16-Cores @ 3.90GHz (16 Cores / 32 Threads), Motherboard: ASUS Pro WS WRX80E-SAGE SE WIFI (0602 BIOS), Chipset: AMD Starship/Matisse, Memory: 256GB, Disk: 4 x 2000GB Samsung SSD 970 EVO Plus 2TB + 1000GB Samsung SSD 970 EVO Plus 1TB + 500GB Western Digital WDS500G2B0B, Graphics: ASPEED 16GB (2450MHz), Audio: Intel Device 4f92, Monitor: 2 x DELL U2312HM + 28E850, Network: 2 x Intel 10G X550T
OS: Ubuntu 20.04.4 LTS, Kernel: 6.2.0-1275.native (x86_64), OpenCL: OpenCL 3.0 + OpenCL 2.1 AMD-APP (3513.0), Compiler: GCC 11.3.0 + LLVM 15.0.3, File-System: overlayfs, Screen Resolution: 1920x1080, System Layer: Docker
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff amdgpu.vm_block_size=10 amdgpu.vm_size=1024 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-serialization=2 --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-11-xKiWfi/gcc-11-11.3.0/debian/tmp-nvptx/usr,amdgcn-amdhsa=/build/gcc-11-xKiWfi/gcc-11-11.3.0/debian/tmp-gcn/usr --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8301055
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2023 23:33 by user root.