KVM testing on Oracle Linux Server 8.8 via the Phoronix Test Suite.
Processor: AMD EPYC 9J14 96-Core (1 Core / 2 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.5.1 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 12 GB RAM QEMU, Disk: 275GB BlockVolume, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Oracle Linux Server 8.8, Kernel: 5.15.0-102.110.5.1.el8uek.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: nvme_core.shutdown_timeout=10 libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: CPU Microcode: 0x1000065
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
Processor: AMD EPYC 9J14 96-Core (1 Core / 2 Threads), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (1.5.1 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 12 GB RAM QEMU, Disk: 275GB BlockVolume, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Oracle Linux Server 8.8, Kernel: 5.15.0-102.110.5.1.el8uek.x86_64 (x86_64), Compiler: GCC 8.5.0 20210514, File-System: xfs, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: nvme_core.shutdown_timeout=10 libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: always
Compiler Notes: --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Processor Notes: CPU Microcode: 0x1000065
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 July 2023 10:46 by user .