Gcrypt_5800X3D_Nobara39
AMD Ryzen 7 5800X3D 8-Core testing with a MSI B450 GAMING PRO CARBON AC (MS-7B85) v1.0 (1.H1 BIOS) and XFX AMD Radeon RX 6950 XT 16GB on NobaraLinux 39 via the Phoronix Test Suite.
AMD Ryzen 7 5800X3D 8-Core
Processor: AMD Ryzen 7 5800X3D 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: MSI B450 GAMING PRO CARBON AC (MS-7B85) v1.0 (1.H1 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2000GB Sabrent Rocket 4.0 2TB + HP SSD EX900 250GB + 2000GB Seagate ST2000DL003-9VT1 + 250GB Samsung SSD 850, Graphics: XFX AMD Radeon RX 6950 XT 16GB, Audio: AMD Navi 21/23, Monitor: G34WQC A, Network: Intel I211 + Intel Wi-Fi 5
OS: NobaraLinux 39, Kernel: 6.8.7-201.fsync.fc39.x86_64 (x86_64), Desktop: KDE Plasma 6.0.4, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1.0-rc1 (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 1.1 Mesa 24.1.0-rc1 + OpenCL 3.0, Compiler: GCC 13.2.1 20240316, File-System: btrfs, Screen Resolution: 3440x1440
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Gcrypt Library
Libgcrypt is a general purpose cryptographic library developed as part of the GnuPG project. This is a benchmark of libgcrypt's integrated benchmark and is measuring the time to run the benchmark command with a cipher/mac/hash repetition count set for 50 times as simple, high level look at the overall crypto performance of the system under test. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 7 5800X3D 8-Core
Processor: AMD Ryzen 7 5800X3D 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: MSI B450 GAMING PRO CARBON AC (MS-7B85) v1.0 (1.H1 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2000GB Sabrent Rocket 4.0 2TB + HP SSD EX900 250GB + 2000GB Seagate ST2000DL003-9VT1 + 250GB Samsung SSD 850, Graphics: XFX AMD Radeon RX 6950 XT 16GB, Audio: AMD Navi 21/23, Monitor: G34WQC A, Network: Intel I211 + Intel Wi-Fi 5
OS: NobaraLinux 39, Kernel: 6.8.7-201.fsync.fc39.x86_64 (x86_64), Desktop: KDE Plasma 6.0.4, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1.0-rc1 (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 1.1 Mesa 24.1.0-rc1 + OpenCL 3.0, Compiler: GCC 13.2.1 20240316, File-System: btrfs, Screen Resolution: 3440x1440
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 May 2024 21:10 by user alex.