Intel Core i5-4300M testing with a Dell 0VWNW8 (A26 BIOS) and AMD Radeon HD 8790M on cachyos rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 5 5600X3D 6-Core (6 Cores / 12 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F37e BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 2000GB Samsung SSD 980 PRO with Heatsink 2TB + 31GB DataTraveler 3.0, Graphics: Intel Arctm A770 DG2 982MB, Audio: NVIDIA GK107 HDMI Audio, Monitor: SAMSUNG + LC27G7xT + LG ULTRAGEAR, Network: Intel I211 + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Arch Linux, Kernel: 6.4.8-native_amd-xanmod1-1-edge (x86_64), Desktop: GNOME Shell 44.3, Display Server: X Server 1.21.1.8 + Wayland, Display Driver: NVIDIA, OpenGL: 4.6 Mesa 23.1.5, OpenCL: OpenCL 3.0 + OpenCL 3.0 CUDA 11.4.402, Compiler: GCC 13.2.1 20230801 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 7920x1440
Kernel Notes: i915.enable_guc=2 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xa20120a
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Athlon Silver 3050U @ 2.30GHz (2 Cores), Motherboard: HP 879E v84.51 (F.65 BIOS), Chipset: AMD Raven/Raven2, Memory: 30GB, Disk: 1024GB ADATA SX8100NP, Graphics: AMD RAVEN2 (1100/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: SteamOS rolling, Kernel: 5.18.1-arch1_testHoloISO_20220606.1811 (x86_64), Desktop: KDE Plasma 5.23.5, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.1.2 (LLVM 13.0.0 DRM 3.46), OpenCL: OpenCL 2.1 AMD-APP (3452.0), Vulkan: 1.3.211, Compiler: GCC 11.1.0 + Clang 13.0.0 + LLVM 13.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 01FHM8 (A10 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 16GB, Disk: 1000GB Western Digital WD Blue SA510 2., Graphics: Intel HD 5500 BDW GT2 16GB (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Linuxmint 21.2, Kernel: 5.15.0-87-generic (x86_64), Desktop: Cinnamon 5.8.4, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 23.0.4-0ubuntu1~22.04.1, OpenCL: OpenCL 3.0, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Processor: Apple M1 @ 2.06GHz (4 Cores / 8 Threads), Motherboard: Apple MacBook Air (M1 2020), Chipset: Apple Silicon, Memory: 16GB, Disk: 500GB APPLE SSD AP0512Q + 2 x 0GB APPLE SSD AP0512Q, Graphics: Apple M1 15GB, Network: Broadcom BRCM4378 + Broadcom BRCM4378 Bluetooth
OS: Arch Linux ARM, Kernel: 6.4.0-asahi-10-1-edge-ARCH (aarch64), Desktop: GNOME Shell 44.4, Display Server: X Server 1.21.1.8 + Wayland, OpenGL: 3.1 Mesa 23.3.0-devel, OpenCL: OpenCL 3.0 PoCL 4.1-pre main-0-g0f3e041c Linux RELOC SPIR SPIR-V LLVM 16.0.6 SLEEF POCL_DEBUG + OpenCL 1.1 Mesa 23.1.7-arch1.1 + OpenCL 3.0, Compiler: GCC 12.1.0 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 2560x1600
Processor Notes: Scaling Governor: apple-cpufreq schedutil (Boost: Enabled)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 7 5800X 8-Core @ 3.80GHz (8 Cores / 16 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F37b BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2000GB Samsung SSD 980 PRO with Heatsink 2TB, Graphics: NVIDIA GeForce RTX 3080 10GB, Audio: AMD Tobago HDMI Audio, Monitor: LG ULTRAGEAR + LC27G7xT + SAMSUNG, Network: Intel I211 + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: EndeavourOS rolling, Kernel: 6.3.2-zen1-1-zen (x86_64), Desktop: KDE Plasma 5.27.5, Display Server: X Server 1.21.1.8 + Wayland, Display Driver: NVIDIA 530.41.03, OpenGL: 4.6.0, OpenCL: OpenCL 2.1 AMD-APP (3558.0) + OpenCL 3.0 CUDA 12.1.98, Compiler: GCC 13.1.1 20230429 + PGI Compiler + Clang 15.0.7 + LLVM 15.0.7 + CUDA 12.0, File-System: ext4, Screen Resolution: 7920x1890
Kernel Notes: radeon.si_support=0 radeon.cik_support=0 amdgpu.si_support=1 amdgpu.cik_support=1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201025
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-9750H @ 4.50GHz (6 Cores / 12 Threads), Motherboard: Dell 0F7T8V (1.14.0 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: 2000GB Samsung SSD 970 EVO Plus 2TB + 1000GB CT1000MX500SSD1, Graphics: Intel UHD 630 CFL GT2 8GB (300/405MHz), Audio: Realtek ALC3204, Network: Realtek Device 2502 + Intel-AC 9260
OS: EndeavourOS rolling, Kernel: 6.2.8-arch1-1 (x86_64), Desktop: KDE Plasma 5.27.3, Display Server: X Server 1.21.1.8, Display Driver: NVIDIA 530.41.03, OpenGL: 4.6 Mesa 23.0.1, OpenCL: OpenCL 3.0 CUDA 12.1.98 + OpenCL 3.0, Compiler: GCC 12.2.1 20230201 + Clang 15.0.7 + LLVM 15.0.7 + CUDA 12.1, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: power) - CPU Microcode: 0xf0
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Processor: Intel Core i5-4300M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: Dell 0VWNW8 (A26 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 128GB SAMSUNG SSD PM85, Graphics: AMD Radeon HD 8790M (1250MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM + Intel Centrino Ultimate-N 6300
OS: cachyos rolling, Kernel: 6.6.2-4-cachyos-lto (x86_64), Desktop: GNOME Shell 45.1, Display Server: X Server 1.21.1.9, OpenGL: 4.6 Mesa 24.0.0-devel (git-023fa0aa5d) (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 24.0.0-devel (git-023fa0aa5d), Compiler: GCC 13.2.1 20231110 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: cfg80211.cfg80211_disable_40mhz_24ghz=1 mac80211.minstrel_vht_only=1 - Transparent Huge Pages: always
Environment Notes: DRI_PRIME=1 NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
Darktable is an open-source photography / workflow application this will use any system-installed Darktable program or on Windows will automatically download the pre-built binary from the project. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 5600X3D 6-Core (6 Cores / 12 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F37e BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 2000GB Samsung SSD 980 PRO with Heatsink 2TB + 31GB DataTraveler 3.0, Graphics: Intel Arctm A770 DG2 982MB, Audio: NVIDIA GK107 HDMI Audio, Monitor: SAMSUNG + LC27G7xT + LG ULTRAGEAR, Network: Intel I211 + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: Arch Linux, Kernel: 6.4.8-native_amd-xanmod1-1-edge (x86_64), Desktop: GNOME Shell 44.3, Display Server: X Server 1.21.1.8 + Wayland, Display Driver: NVIDIA, OpenGL: 4.6 Mesa 23.1.5, OpenCL: OpenCL 3.0 + OpenCL 3.0 CUDA 11.4.402, Compiler: GCC 13.2.1 20230801 + Clang 15.0.7 + LLVM 15.0.7, File-System: ext4, Screen Resolution: 7920x1440
Kernel Notes: i915.enable_guc=2 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xa20120a
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 August 2023 02:50 by user eirikr.
Processor: AMD Athlon Silver 3050U @ 2.30GHz (2 Cores), Motherboard: HP 879E v84.51 (F.65 BIOS), Chipset: AMD Raven/Raven2, Memory: 30GB, Disk: 1024GB ADATA SX8100NP, Graphics: AMD RAVEN2 (1100/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Realtek RTL8821CE 802.11ac PCIe
OS: SteamOS rolling, Kernel: 5.18.1-arch1_testHoloISO_20220606.1811 (x86_64), Desktop: KDE Plasma 5.23.5, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.1.2 (LLVM 13.0.0 DRM 3.46), OpenCL: OpenCL 2.1 AMD-APP (3452.0), Vulkan: 1.3.211, Compiler: GCC 11.1.0 + Clang 13.0.0 + LLVM 13.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 July 2022 20:45 by user eirikr1848.
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 01FHM8 (A10 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 16GB, Disk: 1000GB Western Digital WD Blue SA510 2., Graphics: Intel HD 5500 BDW GT2 16GB (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Linuxmint 21.2, Kernel: 5.15.0-87-generic (x86_64), Desktop: Cinnamon 5.8.4, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 23.0.4-0ubuntu1~22.04.1, OpenCL: OpenCL 3.0, Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4 (ecryptfs), Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x2f - Thermald 2.4.9
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 24 October 2023 01:07 by user eirikr1848.
Processor: Apple M1 @ 2.06GHz (4 Cores / 8 Threads), Motherboard: Apple MacBook Air (M1 2020), Chipset: Apple Silicon, Memory: 16GB, Disk: 500GB APPLE SSD AP0512Q + 2 x 0GB APPLE SSD AP0512Q, Graphics: Apple M1 15GB, Network: Broadcom BRCM4378 + Broadcom BRCM4378 Bluetooth
OS: Arch Linux ARM, Kernel: 6.4.0-asahi-10-1-edge-ARCH (aarch64), Desktop: GNOME Shell 44.4, Display Server: X Server 1.21.1.8 + Wayland, OpenGL: 3.1 Mesa 23.3.0-devel, OpenCL: OpenCL 3.0 PoCL 4.1-pre main-0-g0f3e041c Linux RELOC SPIR SPIR-V LLVM 16.0.6 SLEEF POCL_DEBUG + OpenCL 1.1 Mesa 23.1.7-arch1.1 + OpenCL 3.0, Compiler: GCC 12.1.0 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 2560x1600
Processor Notes: Scaling Governor: apple-cpufreq schedutil (Boost: Enabled)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 September 2023 12:47 by user eirikr1848.
Processor: AMD Ryzen 7 5800X 8-Core @ 3.80GHz (8 Cores / 16 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F37b BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2000GB Samsung SSD 980 PRO with Heatsink 2TB, Graphics: NVIDIA GeForce RTX 3080 10GB, Audio: AMD Tobago HDMI Audio, Monitor: LG ULTRAGEAR + LC27G7xT + SAMSUNG, Network: Intel I211 + Realtek RTL8125 2.5GbE + Intel Wi-Fi 6 AX200
OS: EndeavourOS rolling, Kernel: 6.3.2-zen1-1-zen (x86_64), Desktop: KDE Plasma 5.27.5, Display Server: X Server 1.21.1.8 + Wayland, Display Driver: NVIDIA 530.41.03, OpenGL: 4.6.0, OpenCL: OpenCL 2.1 AMD-APP (3558.0) + OpenCL 3.0 CUDA 12.1.98, Compiler: GCC 13.1.1 20230429 + PGI Compiler + Clang 15.0.7 + LLVM 15.0.7 + CUDA 12.0, File-System: ext4, Screen Resolution: 7920x1890
Kernel Notes: radeon.si_support=0 radeon.cik_support=0 amdgpu.si_support=1 amdgpu.cik_support=1 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201025
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 May 2023 08:44 by user eirikr1848.
Processor: Intel Core i7-9750H @ 4.50GHz (6 Cores / 12 Threads), Motherboard: Dell 0F7T8V (1.14.0 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: 2000GB Samsung SSD 970 EVO Plus 2TB + 1000GB CT1000MX500SSD1, Graphics: Intel UHD 630 CFL GT2 8GB (300/405MHz), Audio: Realtek ALC3204, Network: Realtek Device 2502 + Intel-AC 9260
OS: EndeavourOS rolling, Kernel: 6.2.8-arch1-1 (x86_64), Desktop: KDE Plasma 5.27.3, Display Server: X Server 1.21.1.8, Display Driver: NVIDIA 530.41.03, OpenGL: 4.6 Mesa 23.0.1, OpenCL: OpenCL 3.0 CUDA 12.1.98 + OpenCL 3.0, Compiler: GCC 12.2.1 20230201 + Clang 15.0.7 + LLVM 15.0.7 + CUDA 12.1, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: power) - CPU Microcode: 0xf0
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 31 March 2023 08:34 by user eirikr1848.
Processor: Intel Core i5-4300M @ 3.30GHz (2 Cores / 4 Threads), Motherboard: Dell 0VWNW8 (A26 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 128GB SAMSUNG SSD PM85, Graphics: AMD Radeon HD 8790M (1250MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Intel I217-LM + Intel Centrino Ultimate-N 6300
OS: cachyos rolling, Kernel: 6.6.2-4-cachyos-lto (x86_64), Desktop: GNOME Shell 45.1, Display Server: X Server 1.21.1.9, OpenGL: 4.6 Mesa 24.0.0-devel (git-023fa0aa5d) (LLVM 16.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 24.0.0-devel (git-023fa0aa5d), Compiler: GCC 13.2.1 20231110 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: cfg80211.cfg80211_disable_40mhz_24ghz=1 mac80211.minstrel_vht_only=1 - Transparent Huge Pages: always
Environment Notes: DRI_PRIME=1 NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: intel_cpufreq powersave - CPU Microcode: 0x28
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 29 November 2023 06:15 by user eirikr1848.