AMD Ryzen 5 5500U testing with a HP 887A v59.11 (F.17 BIOS) and AMD Lucienne 512MB on Fedora Linux 38.20230228.n.0 via the Phoronix Test Suite.
Processor: AMD Ryzen 5 5500U @ 2.10GHz (6 Cores / 12 Threads), Motherboard: HP 887A v59.11 (F.17 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 8GB, Disk: 512GB Western Digital PC SN730 SDBPNTY-512G-1006, Graphics: AMD Lucienne 512MB, Audio: AMD Renoir Radeon HD Audio, Network: Realtek Device a85a
OS: Fedora Linux 38.20230228.n.0, Kernel: 6.2.0-63.fc38.x86_64 (x86_64), Desktop: GNOME Shell, Display Server: X Server 1.20.14 + Wayland, OpenGL: 4.6 Mesa 23.0.0-rc4 (LLVM 15.0.7 DRM 3.49), File-System: btrfs, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Enabled) - CPU Microcode: 0x8608103
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 5500U @ 2.10GHz (6 Cores / 12 Threads), Motherboard: HP 887A v59.11 (F.17 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 8GB, Disk: 512GB Western Digital PC SN730 SDBPNTY-512G-1006, Graphics: AMD Lucienne 512MB, Audio: AMD Renoir Radeon HD Audio, Network: Realtek Device a85a
OS: Fedora Linux 38.20230228.n.0, Kernel: 6.2.0-63.fc38.x86_64 (x86_64), Desktop: GNOME Shell, Display Server: X Server 1.20.14 + Wayland, OpenGL: 4.6 Mesa 23.0.0-rc4 (LLVM 15.0.7 DRM 3.49), File-System: btrfs, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Enabled) - CPU Microcode: 0x8608103
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 February 2023 19:40 by user mattia.