openvkl mlc
AMD Ryzen 7 PRO 5850U testing with a HP 8A78 (F.04 BIOS) and AMD Cezanne 512MB on Pop 22.04 via the Phoronix Test Suite.
a
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000c
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
b
c
Processor: AMD Ryzen 7 PRO 5850U @ 4.51GHz (8 Cores / 16 Threads), Motherboard: HP 8A78 (F.04 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43EB1-CWE, Disk: 1024GB SK hynix PC711 HFS001TDE9X073N, Graphics: AMD Cezanne 512MB (2000/400MHz), Audio: AMD Renoir Radeon HD Audio, Network: Realtek RTL8822CE 802.11ac PCIe
OS: Pop 22.04, Kernel: 5.19.0-76051900-generic (x86_64), Desktop: GNOME Shell 42.3.1, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.47), Vulkan: 1.3.204, Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 1920x1080
Intel Memory Latency Checker
Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. If the download fails you may need to manually download the file from https://www.intel.com/content/www/us/en/developer/articles/tool/intelr-memory-latency-checker.html and place it in your PTS download cache. On some systems root privileges are needed to run the MLC tester. Learn more via the OpenBenchmarking.org test page.
OpenVKL
OpenVKL is the Intel Open Volume Kernel Library that offers high-performance volume computation kernels and part of the Intel oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
a
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000c
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 December 2022 11:50 by user root.
b
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000c
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 December 2022 12:08 by user root.
c
Processor: AMD Ryzen 7 PRO 5850U @ 4.51GHz (8 Cores / 16 Threads), Motherboard: HP 8A78 (F.04 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 2 x 8 GB DDR4-3200MT/s Samsung M471A1K43EB1-CWE, Disk: 1024GB SK hynix PC711 HFS001TDE9X073N, Graphics: AMD Cezanne 512MB (2000/400MHz), Audio: AMD Renoir Radeon HD Audio, Network: Realtek RTL8822CE 802.11ac PCIe
OS: Pop 22.04, Kernel: 5.19.0-76051900-generic (x86_64), Desktop: GNOME Shell 42.3.1, Display Server: X Server 1.21.1.3, OpenGL: 4.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.47), Vulkan: 1.3.204, Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa50000c
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 December 2022 12:28 by user root.