docker testing on Ubuntu Noble Numbat via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5950X 16-Core @ 3.40GHz (16 Cores / 32 Threads), Motherboard: ASRockRack X470D4U (P4.20 BIOS), Memory: 32GB, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: EFI VGA, Monitor: DELL U2415
OS: Ubuntu Noble Numbat, Kernel: 6.5.0-27-generic (x86_64), Display Server: X Server, Display Driver: NVIDIA, Compiler: GCC 13.2.0, File-System: overlayfs, Screen Resolution: 800x600, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x0
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5950X 16-Core @ 3.40GHz (16 Cores / 32 Threads), Motherboard: ASRockRack X470D4U (P4.20 BIOS), Memory: 32GB, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: EFI VGA, Monitor: DELL U2415
OS: Ubuntu Noble Numbat, Kernel: 6.5.0-27-generic (x86_64), Display Server: X Server, Display Driver: NVIDIA, Compiler: GCC 13.2.0, File-System: overlayfs, Screen Resolution: 800x600, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x0
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 April 2024 00:44 by user root.