results.txt
KVM testing on Arch Linux via the Phoronix Test Suite.
AMD Ryzen 7 5700
Processor: AMD Ryzen 7 5700 (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16GB, Disk: 43GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Arch Linux, Kernel: 6.7.6-arch1-1 (x86_64), Compiler: GCC 13.2.1 20230801, File-System: btrfs, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0xa50000f
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
CLOMP
CLOMP is the C version of the Livermore OpenMP benchmark developed to measure OpenMP overheads and other performance impacts due to threading in order to influence future system designs. This particular test profile configuration is currently set to look at the OpenMP static schedule speed-up across all available CPU cores using the recommended test configuration. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 7 5700
Processor: AMD Ryzen 7 5700 (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 16GB, Disk: 43GB QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Arch Linux, Kernel: 6.7.6-arch1-1 (x86_64), Compiler: GCC 13.2.1 20230801, File-System: btrfs, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0xa50000f
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 February 2024 08:53 by user arch.