memoc
AMD Ryzen 9 3900X 12-Core testing with a ASRock X570 Pro4 (P2.20 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on Arch rolling via the Phoronix Test Suite.
row160
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
row159
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
row184
Changed Disk to 250GB Samsung SSD 840 + 16GB.
row186
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
row187
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
row199
row211
xmp1
1333mhz
xmp1-2200
xmp1-2400t
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
3600cl14
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
3770 row11
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
OpenArena
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Redis
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Redis
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
row160
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:28 by user gonx.
row159
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:39 by user gonx.
row184
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840 + 16GB, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 10:35 by user gonx.
row186
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 14:46 by user gonx.
row187
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 15:29 by user gonx.
row199
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 17:28 by user gonx.
row211
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:39 by user gonx.
xmp1
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:53 by user gonx.
1333mhz
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 20:07 by user gonx.
xmp1-2200
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 10:33 by user gonx.
xmp1-2400t
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 12:12 by user gonx.
3600cl14
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 December 2019 05:02 by user gonx.
3770 row11
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 16 February 2020 00:43 by user gonx.