test-1
AMD Ryzen 9 5950X 16-Core testing on Debian via the Phoronix Test Suite.
core-uv
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
co-10
co core
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
pybench
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
phpbench
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
gcrypt
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
7zip
webp
openssl
primesieve
ugv266
svt-av1
tjbench
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
phpbench 2
OS: Debian, Kernel: 6.9.3-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240531 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
OpenSSL
Algorithm: SHA256
openssl: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./apps/openssl: /usr/lib/x86_64-linux-gnu/libcrypto.so.3: version `OPENSSL_3.3.0' not found (required by ./apps/openssl)
Coremark
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
libjpeg-turbo tjbench
tjbench is a JPEG decompression/compression benchmark that is part of libjpeg-turbo, a JPEG image codec library optimized for SIMD instructions on modern CPU architectures. Learn more via the OpenBenchmarking.org test page.
7-Zip Compression
WebP Image Encode
LibRaw
LibRaw is a RAW image decoder for digital camera photos. This test profile runs LibRaw's post-processing benchmark. Learn more via the OpenBenchmarking.org test page.
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
PyBench
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
C-Ray
Primesieve
core-uv
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 17:01 by user guest.
co-10
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 19:50 by user guest.
co core
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.1-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 May 2024 23:22 by user guest.
pybench
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Python Notes: Python 2.7.15 + Python 3.12.2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:00 by user guest.
phpbench
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:06 by user guest.
gcrypt
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:10 by user guest.
7zip
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:13 by user guest.
webp
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:17 by user guest.
openssl
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:26 by user guest.
primesieve
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:32 by user guest.
ugv266
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 18:58 by user guest.
svt-av1
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 19:01 by user guest.
tjbench
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.2-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240524 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-default-pie --disable-default-ssp --disable-multilib --disable-nls --disable-nls --disable-silent-rules --disable-stage1-checking --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-cxx-flags='-pipe --enable-gnu-indirect-function --enable-initfini-array --enable-languages=c,c++,lto,fortran --enable-libgomp --enable-stage1-languages=c,lto --enable-static --with-arch=znver3 --with-build-config=bootstrap-lto --with-cpu=znver3 --with-fpmath=avx --with-gcc-major-version-only --with-gmp=/home/sven/gcc --with-gnu-as --with-gnu-ld --with-linker-hash-style=gnu --with-mpc=/home/sven/gcc --with-mpfr=/home/sven/gcc --with-tune=znver3 --without-libiconv-prefix --without-libintl-prefix --without-system-zlib --without-zstd -O3 -Wno-error -fno-checking' -fno-fast-math -fomit-frame-pointer -march=native
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 May 2024 22:02 by user guest.
phpbench 2
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: 1000GB Western Digital WDS100T1X0E-00AFY0 + 2000GB Western Digital WD20EZBX-00A + 2 x 250GB Samsung SSD 850, Graphics: ASUS NVIDIA GeForce RTX 3060 Ti 8GB, Audio: NVIDIA GA104 HD Audio, Monitor: LG HDR WFHD, Network: Intel 82574L + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Debian, Kernel: 6.9.3-sven (x86_64), Desktop: Xfce, Display Server: X Server 1.21.1.11, Display Driver: NVIDIA 555.42.02, OpenGL: 4.6.0 NVIDIA 555.42.02, Compiler: GCC 14.1.1 20240531 [releases/gcc-13 r13-7824-gea98e4c80d5] + Clang 17.0.6 + LLVM 17.0.6 + CUDA 12.4, File-System: f2fs, Screen Resolution: 2560x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20120e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 June 2024 18:48 by user guest.