AMD Ryzen 7 4700U testing with a LENOVO 20T6002VRI (R1AET34W 1.10 BIOS) and AMD Renoir 512MB on Slackware 14.2 x86_64 via the Phoronix Test Suite.
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-slackware-linux --disable-gtktest --disable-install-libiberty --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,brig,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-dual-abi --enable-lto --enable-multilib --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-slackware-linux --mandir=/usr/man --target=x86_64-slackware-linux --verbose --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-gnu-ld --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: LENOVO 20T6002VRI (R1AET34W 1.10 BIOS), Chipset: AMD Renoir Root Complex, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43DB1-CWE, Disk: 512GB Western Digital PC SN530 SDBPMPZ-512G-1001, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Realtek RTL8111/8168/8411 + Intel Wi-Fi 6 AX200
OS: Slackware 14.2 x86_64, Kernel: 5.13.0-bs3 (x86_64), Desktop: KDE Plasma 5.22.2, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.1.4 (LLVM 12.0.0), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.0 + LLVM 12.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
XSBench is a mini-app representing a key computational kernel of the Monte Carlo neutronics application OpenMC. Learn more via the OpenBenchmarking.org test page.
LAMMPS is a classical molecular dynamics code, and an acronym for Large-scale Atomic/Molecular Massively Parallel Simulator. Learn more via the OpenBenchmarking.org test page.
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Compiler Notes: --build=x86_64-slackware-linux --disable-gtktest --disable-install-libiberty --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,brig,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-dual-abi --enable-lto --enable-multilib --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-slackware-linux --mandir=/usr/man --target=x86_64-slackware-linux --verbose --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-gnu-ld --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 July 2021 10:44 by user root.
Processor: AMD Ryzen 7 4700U @ 2.00GHz (8 Cores), Motherboard: LENOVO 20T6002VRI (R1AET34W 1.10 BIOS), Chipset: AMD Renoir Root Complex, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43DB1-CWE, Disk: 512GB Western Digital PC SN530 SDBPMPZ-512G-1001, Graphics: AMD Renoir 512MB (1600/400MHz), Audio: AMD Device 1637, Network: Realtek RTL8111/8168/8411 + Intel Wi-Fi 6 AX200
OS: Slackware 14.2 x86_64, Kernel: 5.13.0-bs3 (x86_64), Desktop: KDE Plasma 5.22.2, Display Server: X Server 1.20.11, OpenGL: 4.6 Mesa 21.1.4 (LLVM 12.0.0), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.0 + LLVM 12.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: ipv6.disable=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8600103 - ACPI Profile: balanced
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 July 2021 10:52 by user root.