xanmod-vs-netext
AMD Ryzen 7 4700U testing with a RO Kona_RN (V1.08 BIOS) and AMD Renoir 512MB on Ubuntu 20.04 via the Phoronix Test Suite.
5.14.2-xanmod1-cacule
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: RO Kona_RN (V1.08 BIOS), Chipset: AMD Renoir Root Complex, Memory: 16GB, Disk: 1024GB SAMSUNG MZVLQ1T0HALB-00000, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.14.2-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
5.13.10-ext73-93.10-ryzen-2
OS: Ubuntu 20.04, Kernel: 5.13.10-ext73-93.10-ryzen-2 (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
5.14.2-xanmod1-edge
OS: Ubuntu 20.04, Kernel: 5.14.2-xanmod1-edge (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Stress-NG
Stress-NG is a Linux stress tool developed by Colin King of Canonical. Learn more via the OpenBenchmarking.org test page.
5.14.2-xanmod1-cacule
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: RO Kona_RN (V1.08 BIOS), Chipset: AMD Renoir Root Complex, Memory: 16GB, Disk: 1024GB SAMSUNG MZVLQ1T0HALB-00000, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.14.2-xanmod1-cacule (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 September 2021 10:44 by user miq.
5.13.10-ext73-93.10-ryzen-2
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: RO Kona_RN (V1.08 BIOS), Chipset: AMD Renoir Root Complex, Memory: 16GB, Disk: 1024GB SAMSUNG MZVLQ1T0HALB-00000, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.13.10-ext73-93.10-ryzen-2 (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 September 2021 13:07 by user miq.
5.14.2-xanmod1-edge
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: RO Kona_RN (V1.08 BIOS), Chipset: AMD Renoir Root Complex, Memory: 16GB, Disk: 1024GB SAMSUNG MZVLQ1T0HALB-00000, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Intel Wi-Fi 6 AX200
OS: Ubuntu 20.04, Kernel: 5.14.2-xanmod1-edge (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.0.3 (LLVM 12.0.0), Vulkan: 1.2.145, Compiler: GCC 11.2.1 20210814, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Compiler Notes: --disable-bootstrap --disable-isl-version-check --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-nls --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-cloog-backend=isl --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++ --enable-lto --enable-plugin --enable-threads=posix --enable-tls --with-linker-hash-style=gnu --with-plugin-ld=/opt/binutils-2.37/bin/ld
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600102
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 September 2021 16:17 by user miq.