m6500
AMD Ryzen 5 3500U testing with a HP 8615 v46.30 (F.45 BIOS) and AMD Picasso 2GB on Ubuntu 20.04 via the Phoronix Test Suite.
NVIDIA NV92
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 4.15.0-65-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
B
b
OS: Ubuntu 18.04, Kernel: 5.0.0-31-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
bluetooth racecondition solved
powersave inhibit enabled bt-resolved
OS: Ubuntu 18.04, Kernel: 5.0.0-32-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
nVidia 340
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
nVidia 340 cpperf
+1suspend
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
cpu-powersave
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-32-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: NVIDIA 340.107, OpenGL: 3.3.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
clean cpu-perf
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Schedutil
GPU max perf
GPU mac CPU Schedutil
GPU-perf CPU-Max
just because
hang
max
avg
Changed Disk to 256GB TOSHIBA KSG60ZSE.
nouveau
m6500-paste
m6500-paste-perf
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-34-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
M6500-nv-340
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-34-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.4, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
m6500-nvocl
OS: Ubuntu 18.04, Kernel: 5.3.0-47-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
m6500
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
m6500-20
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE + 32GB SAMSUNG MZMPC032, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 20.04, Kernel: 5.4.0-29-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
m6500-2ssd
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE + 32GB SAMSUNG MZMPC032, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Monitor: Philips 190CW, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 20.04, Kernel: 5.4.0-33-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3360x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
15-3568
Processor: Intel Core i5-7200U @ 3.10GHz (4 Cores), Motherboard: Dell 0H03XT, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 1 x 8192 MB DDR4-2400MT/s, Disk: 256GB Micron 1100 SATA, Graphics: Intel HD 620, Audio: Realtek ALC3246, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac Wireless
OS: Ubuntu 20.04, Kernel: 5.4.0-37-generic (x86_64), Display Server: X Server vt.handoff=7, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.4, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Hp-Ryzen-5-3500U
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.24 (F.42 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB Kioxia KBG30ZMV256G, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-50-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Hp-Ryzen-5-3500U-dual-14GB
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 14GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-51-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
3500u
Changed Memory to 6GB.
amdgpu-pro
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Radeon 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6.14735, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
amdgpu-pro-cleaned
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
amd-gpu-proprietary
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.3.4 (LLVM 11.0.1), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Unigine Valley
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
GpuTest
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Tesseract
Tesseract is a fork of Cube 2 Sauerbraten with numerous graphics and game-play improvements. Tesseract has been in development since 2012 while its first release happened in May of 2014. Learn more via the OpenBenchmarking.org test page.
OpenArena
NVIDIA NV92
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 4.15.0-65-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 12 October 2019 17:58 by user axion.
B
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 12 October 2019 21:19 by user axion.
b
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-31-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 12 October 2019 21:53 by user axion.
bluetooth racecondition solved
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 October 2019 06:14 by user axion.
powersave inhibit enabled bt-resolved
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-32-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: nouveau 1.0.15, OpenGL: 3.3 Mesa 19.0.8, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Graphics Notes: EXA
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 October 2019 06:34 by user axion.
nVidia 340
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 October 2019 22:53 by user axion.
nVidia 340 cpperf
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 October 2019 23:42 by user axion.
+1suspend
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 14 October 2019 03:53 by user axion.
cpu-powersave
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE + 31GB Ultra, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-32-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: NVIDIA 340.107, OpenGL: 3.3.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 14 October 2019 08:01 by user axion.
clean cpu-perf
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 16 October 2019 06:27 by user axion.
Schedutil
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 16 October 2019 07:09 by user axion.
GPU max perf
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 18 October 2019 11:04 by user axion.
GPU mac CPU Schedutil
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 18 October 2019 11:50 by user axion.
GPU-perf CPU-Max
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 18 October 2019 12:31 by user axion.
just because
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 20 October 2019 08:30 by user axion.
hang
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 20 October 2019 09:27 by user axion.
max
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 20 October 2019 10:21 by user axion.
avg
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-32-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.19.6, Display Driver: NVIDIA 340.107, OpenGL: 3.3.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 20 October 2019 11:01 by user axion.
nouveau
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 11 November 2019 19:48 by user axion.
m6500-paste
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 7 March 2020 00:04 by user axion.
m6500-paste-perf
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 8192MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA NV92 1GB, Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-34-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 7 March 2020 00:05 by user axion.
M6500-nv-340
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.0.0-34-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.4, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 13 April 2020 16:48 by user axion.
m6500-nvocl
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 18.04, Kernel: 5.3.0-47-generic (x86_64), Desktop: MATE 1.20.1, Display Server: X Server 1.20.5, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 13 April 2020 18:08 by user axion.
m6500
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 May 2020 15:25 by user axion.
m6500-20
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE + 32GB SAMSUNG MZMPC032, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 20.04, Kernel: 5.4.0-29-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1200
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 May 2020 16:18 by user axion.
m6500-2ssd
Processor: Intel Core i7 840Q @ 1.87GHz (4 Cores / 8 Threads), Motherboard: Dell 0R1203 (A10 BIOS), Chipset: Intel Core DMI, Memory: 14336MB, Disk: 256GB TOSHIBA KSG60ZSE + 32GB SAMSUNG MZMPC032, Graphics: NVIDIA Quadro FX 2800M 1GB (600/1000MHz), Audio: IDT 92HD81B1C5, Monitor: Philips 190CW, Network: Broadcom NetXtreme BCM5761e PCIe + Intel Centrino Ultimate-N 6300
OS: Ubuntu 20.04, Kernel: 5.4.0-33-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 340.108, OpenGL: 3.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3360x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 June 2020 21:44 by user axion.
15-3568
Processor: Intel Core i5-7200U @ 3.10GHz (4 Cores), Motherboard: Dell 0H03XT, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 1 x 8192 MB DDR4-2400MT/s, Disk: 256GB Micron 1100 SATA, Graphics: Intel HD 620, Audio: Realtek ALC3246, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9377 802.11ac Wireless
OS: Ubuntu 20.04, Kernel: 5.4.0-37-generic (x86_64), Display Server: X Server vt.handoff=7, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.0.4, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate performance
Testing initiated at 10 June 2020 22:43 by user root.
Hp-Ryzen-5-3500U
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.24 (F.42 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB Kioxia KBG30ZMV256G, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-50-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 April 2021 01:59 by user axion.
Hp-Ryzen-5-3500U-dual-14GB
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 14GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-51-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 April 2021 17:04 by user axion.
3500u
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-51-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 April 2021 18:16 by user axion.
amdgpu-pro
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Radeon 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6.14735, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 May 2021 20:50 by user axion.
amdgpu-pro-cleaned
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.6 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 May 2021 20:57 by user axion.
amd-gpu-proprietary
Processor: AMD Ryzen 5 3500U @ 2.10GHz (4 Cores / 8 Threads), Motherboard: HP 8615 v46.30 (F.45 BIOS), Chipset: AMD Raven/Raven2, Memory: 6GB, Disk: 256GB SK hynix BC511 HFM256GDJTNI-82A0A, Graphics: AMD Picasso 2GB (1200/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: Ubuntu 20.04, Kernel: 5.8.0-54-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.3.4 (LLVM 11.0.1), Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8108102
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 14 May 2021 21:09 by user axion.