AMD Ryzen 5 2500U testing with a RR Freed_RRS (V1.13 BIOS) and AMD Radeon Vega / Mobile 1GB on ManjaroLinux 18.0.4 via the Phoronix Test Suite.
Kernel Notes: scsi_mod.use_blk_mq=1
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Processor: AMD Ryzen 5 2500U @ 2.00GHz (4 Cores / 8 Threads), Motherboard: RR Freed_RRS (V1.13 BIOS), Chipset: AMD Raven/Raven2, Memory: 15360MB, Disk: PNY CS1311 960GB + 256GB HFS256G39TND-N21, Graphics: AMD Radeon Vega / Mobile 1GB (1275/1450MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA6174 802.11ac
OS: ManjaroLinux 18.0.4, Kernel: 5.3.0-1-MANJARO (x86_64), Desktop: KDE Plasma 5.16.3, Display Server: X Server 1.20.5, Display Driver: amdgpu 19.0.1, OpenGL: 4.5 Mesa 19.1.3 (LLVM 8.0.1), OpenCL: OpenCL 1.1 Mesa 19.1.3, Vulkan: 1.1.90, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: ext4, Screen Resolution: 1920x1080
Stress-NG is a Linux stress tool developed by Colin King of Canonical. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: scsi_mod.use_blk_mq=1
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Testing initiated at 7 August 2019 21:08 by user tonatiuhmira.
Kernel Notes: scsi_mod.use_blk_mq=1
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Testing initiated at 7 August 2019 21:11 by user tonatiuhmira.
Processor: AMD Ryzen 5 2500U @ 2.00GHz (4 Cores / 8 Threads), Motherboard: RR Freed_RRS (V1.13 BIOS), Chipset: AMD Raven/Raven2, Memory: 15360MB, Disk: PNY CS1311 960GB + 256GB HFS256G39TND-N21, Graphics: AMD Radeon Vega / Mobile 1GB (1275/1450MHz), Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA6174 802.11ac
OS: ManjaroLinux 18.0.4, Kernel: 5.3.0-1-MANJARO (x86_64), Desktop: KDE Plasma 5.16.3, Display Server: X Server 1.20.5, Display Driver: amdgpu 19.0.1, OpenGL: 4.5 Mesa 19.1.3 (LLVM 8.0.1), OpenCL: OpenCL 1.1 Mesa 19.1.3, Vulkan: 1.1.90, Compiler: GCC 9.1.0 + Clang 8.0.1, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: scsi_mod.use_blk_mq=1
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Testing initiated at 7 August 2019 21:15 by user tonatiuhmira.