AMD Ryzen 9 3900X 12-Core testing with a ASRock X570 Pro4 (P2.20 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on Arch rolling via the Phoronix Test Suite.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Changed Disk to 250GB Samsung SSD 840 + 16GB.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:28 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:39 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840 + 16GB, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 10:35 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 14:46 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 15:29 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 17:28 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:39 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:53 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 20:07 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 10:33 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 12:12 by user gonx.
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 December 2019 05:02 by user gonx.
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 16 February 2020 00:43 by user gonx.