AMD Ryzen 9 5950X 16-Core testing on Debian via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
OS: Debian, Kernel: 6.9.3-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240531 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
tjbench is a JPEG decompression/compression benchmark that is part of libjpeg-turbo, a JPEG image codec library optimized for SIMD instructions on modern CPU architectures. Learn more via the OpenBenchmarking.org test page.
LibRaw is a RAW image decoder for digital camera photos. This test profile runs LibRaw's post-processing benchmark. Learn more via the OpenBenchmarking.org test page.
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
Primesieve generates prime numbers using a highly optimized sieve of Eratosthenes implementation. Primesieve primarily benchmarks the CPU's L1/L2 cache performance. Learn more via the OpenBenchmarking.org test page.
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
Algorithm: SHA256
openssl: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./apps/openssl: /usr/lib/x86_64-linux-gnu/libcrypto.so.3: version `OPENSSL_3.3.0' not found (required by ./apps/openssl)
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 17:01 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 19:50 by user guest.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 23:22 by user guest.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:00 by user guest.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:06 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:10 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:13 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:17 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:26 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:32 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:58 by user guest.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 19:01 by user guest.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 22:02 by user guest.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.3-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240531 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 June 2024 18:48 by user guest.