k5.19.9-productivity

AMD Ryzen 5 1500X testing with a ASUS ROG STRIX X370-F GAMING (6026 BIOS) and Gigabyte AMD Radeon RX 580 8GB on Linuxmint 21 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2210089-ANDR-K5199PR98
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
AMD Ryzen 5 1500X - Gigabyte AMD Radeon RX 580 8GB -
October 08 2022
 


k5.19.9-productivityOpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 5 1500X @ 3.50GHz (4 Cores / 8 Threads)ASUS ROG STRIX X370-F GAMING (6026 BIOS)AMD 17h16GB1000GB Western Digital WDS100T1X0E-00AFY0 + 3001GB TOSHIBA DT01ACA3 + 31GB x765w + 4001GBGigabyte AMD Radeon RX 580 8GB (1340/2000MHz)AMD Ellesmere HDMI AudioROG PG279QIntel I211Linuxmint 215.19.13-051913-generic (x86_64)MATE 1.26.0X Server 1.21.1.34.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.47)1.3.204GCC 11.2.0 + Clang 14.0.0-1ubuntu1ext42560x1440ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLVulkanCompilerFile-SystemScreen ResolutionK5.19.9-productivity BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected