Various open-source benchmarks by the Phoronix Test Suite v10.8.4.
Processor: AMD Ryzen 5 5600X 6-Core @ 4.28GHz (6 Cores / 12 Threads), Motherboard: MSI B450 GAMING PLUS MAX (MS-7B86) v3.0 (H.M1 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 960GB Corsair Force MP510 + 240GB CT240BX500SSD1, Graphics: MSI AMD Radeon RX 5700 XT 8GB, Audio: C-Media CMI8888, Monitor: Odyssey G52A, Network: Realtek RTL8111/8168/8211/8411
OS: ManjaroLinux 24.0.7, Kernel: 6.10.5-1-MANJARO (x86_64), Desktop: KDE Plasma 6.0.5, Display Server: X Server 1.21.1.13, OpenGL: 4.6 Mesa 24.1.6-arch1.1 (LLVM 18.1.8 DRM 3.57), Compiler: GCC 14.2.1 20240805, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa20102b
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Botan is a BSD-licensed cross-platform open-source C++ crypto library "cryptography toolkit" that supports most publicly known cryptographic algorithms. The project's stated goal is to be "the best option for cryptography in C++ by offering the tools necessary to implement a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes." Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 5600X 6-Core @ 4.28GHz (6 Cores / 12 Threads), Motherboard: MSI B450 GAMING PLUS MAX (MS-7B86) v3.0 (H.M1 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 960GB Corsair Force MP510 + 240GB CT240BX500SSD1, Graphics: MSI AMD Radeon RX 5700 XT 8GB, Audio: C-Media CMI8888, Monitor: Odyssey G52A, Network: Realtek RTL8111/8168/8211/8411
OS: ManjaroLinux 24.0.7, Kernel: 6.10.5-1-MANJARO (x86_64), Desktop: KDE Plasma 6.0.5, Display Server: X Server 1.21.1.13, OpenGL: 4.6 Mesa 24.1.6-arch1.1 (LLVM 18.1.8 DRM 3.57), Compiler: GCC 14.2.1 20240805, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++,rust --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa20102b
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 August 2024 16:11 by user radar.