AMD Ryzen 7 4700U testing with a LENOVO 20T6002VRI (R1AET34W 1.10 BIOS) and AMD Renoir 512MB on Slackware 14.2 x86_64 via the Phoronix Test Suite.
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: LENOVO 20T6002VRI (R1AET34W 1.10 BIOS), Chipset: AMD Renoir Root Complex, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43DB1-CWE, Disk: 512GB Western Digital PC SN530 SDBPMPZ-512G-1001, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Realtek RTL8111/8168/8411 + Intel Wi-Fi 6 AX200
OS: Slackware 14.2 x86_64, Kernel: 5.12.12-bs3 (x86_64), Desktop: KDE Plasma 5.22.1, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.1.3 (LLVM 12.0.0), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.0 + LLVM 12.0.0, File-System: ext4, Screen Resolution: 1920x1080
Intel OSPray is a portable ray-tracing engine for high-performance, high-fidenlity scientific visualizations. OSPray builds off Intel's Embree and Intel SPMD Program Compiler (ISPC) components as part of the oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 June 2021 20:18 by user root.
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: LENOVO 20T6002VRI (R1AET34W 1.10 BIOS), Chipset: AMD Renoir Root Complex, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43DB1-CWE, Disk: 512GB Western Digital PC SN530 SDBPMPZ-512G-1001, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Realtek RTL8111/8168/8411 + Intel Wi-Fi 6 AX200
OS: Slackware 14.2 x86_64, Kernel: 5.12.12-bs3 (x86_64), Desktop: KDE Plasma 5.22.1, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.1.3 (LLVM 12.0.0), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.0 + LLVM 12.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 June 2021 20:25 by user root.