AMD Ryzen 9 3900X 12-Core testing with a ASRock X570 Pro4 (P2.20 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on Arch rolling via the Phoronix Test Suite.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Changed Disk to 250GB Samsung SSD 840 + 16GB.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Redis is an open-source data structure server. Learn more via the OpenBenchmarking.org test page.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:28 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 09:39 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840 + 16GB, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.11-zengonx-g7b430f170ac0-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 9 September 2019 10:35 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate powersave
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 14:46 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 15:29 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 17:28 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:39 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 19:53 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 20 September 2019 20:07 by user gonx.
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 10:33 by user gonx.
Processor: Intel Core i7-4770K @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z87X-UD4H-CF (10b BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: Intel 8 /C220, Monitor: W2453 + DELL U2711, Network: Intel I217-V
OS: Arch rolling, Kernel: 5.2.15-zengonx-g33c542103421-dirty (x86_64), Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.3.0-devel (git-f2bed9b344) (LLVM 8.0.1), Vulkan: 1.1.107, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: btrfs, Screen Resolution: 4480x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled
Testing initiated at 21 September 2019 12:12 by user gonx.
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 250GB Samsung SSD 840, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.4.5-zen-gee7a4a721d2f-dirty (x86_64), Display Server: X Server 1.20.6, OpenGL: 4.5 Mesa 20.0.0-devel (git-3b3494174d) (LLVM 10.0.0), Vulkan: 1.1.107, Compiler: GCC 9.2.0 + Clang 9.0.0, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 December 2019 05:02 by user gonx.
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASRock X570 Pro4 (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 16384MB, Disk: 960GB Force MP510, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: Q32G1WG4 + DELL U2711, Network: Intel I211
OS: Arch rolling, Kernel: 5.5.3-zen-g82e21f3a8e0b-dirty (x86_64), Display Server: X Server 1.20.7, OpenGL: 4.5 Mesa 19.3.3 (LLVM 9.0.1), Vulkan: 1.1.107, Compiler: GCC 9.2.1 20200130 + Clang 9.0.1 + LLVM 9.0.1, File-System: btrfs, Screen Resolution: 5120x1440
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8701013
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 16 February 2020 00:43 by user gonx.