Intel Core i5-4300M testing with a Dell 0VWNW8 (A26 BIOS) and AMD Radeon HD 8790M on cachyos rolling via the Phoronix Test Suite.
Processor: AMD E2-3800 APU @ 1.30GHz (4 Cores), Motherboard: TOSHIBA Portable PC (1.80 BIOS), Chipset: AMD 16h Root Complex, Memory: 16GB, Disk: 120GB OCZ TRION100, Graphics: AMD Radeon HD 8200 / R3 512MB, Audio: Realtek ALC269VB, Network: Realtek RTL810xE PCI + Realtek RTL8188EE
OS: cachyos rolling, Kernel: 6.5.3-3-cachyos (x86_64), Desktop: MATE 1.26.1, Display Server: X Server 1.21.1.8, OpenGL: 4.6 Mesa 23.1.6-arch1.4 (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: zfs, Screen Resolution: 1366x768
Kernel Notes: amdgpu.abmlevel=2 amdgpu.aspm=-1 amdgpu.audio=-1 amdgpu.bapm=1 amdgpu.ignore_crat=0 amdgpu pute_multipipe=-1 amdgpu.cwsr_enable=1 amdgpu.dc=1 amdgpu.dcfeaturemask=0xFA amdgpu.deep_color=1 amdgpu.discovery=1 amdgpu.disp_priority=2 amdgpu.dpm=1 amdgpu.exp_hw_support=1 amdgpu.freesync_video=1 amdgpu.fw_load_type=-1 amdgpu.gpu_recovery=1 amdgpu.hw_i2c=1 amdgpu.hws_gws_support=true amdgpu.cik_support=1 amdgpu.si_support=1 amdgpu.moverate=8 amdgpu.ras_enable=1 amdgpu.mes=1 amdgpu.mes_kiq=1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-march=native -O3 -pipe -ftree-vectorize -fopenmp -malign-double -ftree-vectorize -fstrict-aliasing --param=ssp-buffer-size=4 -ffast-math -fexceptions -fomit-frame-pointer -fgraphite-identity -floop-nest-optimize -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -pthread -flto=auto -Wp,-D_GLIBCXX_ASSERTIONS -fpermissive" LDFLAGS=-Wl,-O2,--sort-common,--as-needed,-z,relro,-z,now,-lgomp,-lpthread,-lquadmath,-lm CFLAGS="-march=native -O3 -pipe -ftree-vectorize -fopenmp -malign-double -ftree-vectorize -fstrict-aliasing --param=ssp-buffer-size=4 -ffast-math -fexceptions -fomit-frame-pointer -fgraphite-identity -floop-nest-optimize -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -pthread -flto=auto"
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x700010f
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 512 MB - vBIOS Version: BR44414.bin
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 01FHM8 (A10 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 16GB, Disk: 1000GB Western Digital WD Blue SA510 2., Graphics: Intel HD 5500 BDW GT2 16GB (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Linuxmint 21.2, Kernel: 5.15.0-87-generic (x86_64), Desktop: Cinnamon 5.8.4, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 23.0.4-0ubuntu1~22.04.1, OpenCL: OpenCL 3.0, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Intel Core i5-4300M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: Dell 0VWNW8 (A26 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 128GB SAMSUNG SSD PM85, Graphics: AMD Radeon HD 8790M (1250MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM + Intel Centrino Ultimate-N 6300
OS: cachyos rolling, Kernel: 6.6.2-4-cachyos-lto (x86_64), Desktop: GNOME Shell 45.1, Display Server: X Server 1.21.1.9, OpenGL: 4.6 Mesa 23.2.1-arch1.2 (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 2.1 AMD-APP.dbg (3590.0) + OpenCL 3.0 + OpenCL 2.0 AMD-APP (1800.8) + OpenCL 2.1 LINUX, Compiler: GCC 13.2.1 20231110 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: cfg80211.cfg80211_disable_40mhz_24ghz=1 mac80211.minstrel_vht_only=1 - Transparent Huge Pages: always
Environment Notes: DRI_PRIME=1 NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
Processor: AMD E2-3800 APU @ 1.30GHz (4 Cores), Motherboard: TOSHIBA Portable PC (1.80 BIOS), Chipset: AMD 16h Root Complex, Memory: 16GB, Disk: 120GB OCZ TRION100, Graphics: AMD Radeon HD 8200 / R3 512MB, Audio: Realtek ALC269VB, Network: Realtek RTL810xE PCI + Realtek RTL8188EE
OS: cachyos rolling, Kernel: 6.5.3-3-cachyos (x86_64), Desktop: MATE 1.26.1, Display Server: X Server 1.21.1.8, OpenGL: 4.6 Mesa 23.1.6-arch1.4 (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 3.0, Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: zfs, Screen Resolution: 1366x768
Kernel Notes: amdgpu.abmlevel=2 amdgpu.aspm=-1 amdgpu.audio=-1 amdgpu.bapm=1 amdgpu.ignore_crat=0 amdgpu pute_multipipe=-1 amdgpu.cwsr_enable=1 amdgpu.dc=1 amdgpu.dcfeaturemask=0xFA amdgpu.deep_color=1 amdgpu.discovery=1 amdgpu.disp_priority=2 amdgpu.dpm=1 amdgpu.exp_hw_support=1 amdgpu.freesync_video=1 amdgpu.fw_load_type=-1 amdgpu.gpu_recovery=1 amdgpu.hw_i2c=1 amdgpu.hws_gws_support=true amdgpu.cik_support=1 amdgpu.si_support=1 amdgpu.moverate=8 amdgpu.ras_enable=1 amdgpu.mes=1 amdgpu.mes_kiq=1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-march=native -O3 -pipe -ftree-vectorize -fopenmp -malign-double -ftree-vectorize -fstrict-aliasing --param=ssp-buffer-size=4 -ffast-math -fexceptions -fomit-frame-pointer -fgraphite-identity -floop-nest-optimize -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -pthread -flto=auto -Wp,-D_GLIBCXX_ASSERTIONS -fpermissive" LDFLAGS=-Wl,-O2,--sort-common,--as-needed,-z,relro,-z,now,-lgomp,-lpthread,-lquadmath,-lm CFLAGS="-march=native -O3 -pipe -ftree-vectorize -fopenmp -malign-double -ftree-vectorize -fstrict-aliasing --param=ssp-buffer-size=4 -ffast-math -fexceptions -fomit-frame-pointer -fgraphite-identity -floop-nest-optimize -Wp,-D_FORTIFY_SOURCE=2 -fstack-clash-protection -fcf-protection -pthread -flto=auto"
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x700010f
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 512 MB - vBIOS Version: BR44414.bin
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 September 2023 12:36 by user eirikr1848.
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 01FHM8 (A10 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 16GB, Disk: 1000GB Western Digital WD Blue SA510 2., Graphics: Intel HD 5500 BDW GT2 16GB (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Linuxmint 21.2, Kernel: 5.15.0-87-generic (x86_64), Desktop: Cinnamon 5.8.4, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 23.0.4-0ubuntu1~22.04.1, OpenCL: OpenCL 3.0, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 24 October 2023 01:26 by user eirikr1848.
Processor: Intel Core i5-4300M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: Dell 0VWNW8 (A26 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 128GB SAMSUNG SSD PM85, Graphics: AMD Radeon HD 8790M (1250MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM + Intel Centrino Ultimate-N 6300
OS: cachyos rolling, Kernel: 6.6.2-4-cachyos-lto (x86_64), Desktop: GNOME Shell 45.1, Display Server: X Server 1.21.1.9, OpenGL: 4.6 Mesa 23.2.1-arch1.2 (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 2.1 AMD-APP.dbg (3590.0) + OpenCL 3.0 + OpenCL 2.0 AMD-APP (1800.8) + OpenCL 2.1 LINUX, Compiler: GCC 13.2.1 20231110 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: cfg80211.cfg80211_disable_40mhz_24ghz=1 mac80211.minstrel_vht_only=1 - Transparent Huge Pages: always
Environment Notes: DRI_PRIME=1 NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 28 November 2023 09:30 by user eirikr1848.