AMD Ryzen 9 5950X 16-Core testing on Debian via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
LibRaw is a RAW image decoder for digital camera photos. This test profile runs LibRaw's post-processing benchmark. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 17:01 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 19:50 by user guest.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 23:22 by user guest.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:00 by user guest.