AMD Ryzen 7 PRO 7840U testing with a LENOVO 21K5CTO1WW (R2FET33W 1.13 BIOS) and AMD Phoenix1 on Arch rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 7 PRO 7840U @ 5.13GHz (8 Cores / 16 Threads), Motherboard: LENOVO 21K5CTO1WW (R2FET33W 1.13 BIOS), Chipset: AMD Device 14e8, Memory: 32GB, Disk: 2048GB Acer SSD FA100 2TB + 0GB SD/MMC + 0GB Micro SD/M2, Graphics: AMD Phoenix1, Audio: AMD Rembrandt Radeon HD Audio, Network: Realtek RTL8111/8168/8411 + Qualcomm QCNFA765
OS: Arch rolling, Kernel: 6.6.1-zen1-1-zen (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.21.1.9, OpenCL: OpenCL 2.1 AMD-APP.dbg (3570.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - Platform Profile: low-power - CPU Microcode: 0xa704103 - ACPI Profile: low-power
Graphics Notes: GLAMOR
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 PRO 7840U @ 5.13GHz (8 Cores / 16 Threads), Motherboard: LENOVO 21K5CTO1WW (R2FET33W 1.13 BIOS), Chipset: AMD Device 14e8, Memory: 32GB, Disk: 2048GB Acer SSD FA100 2TB + 0GB SD/MMC + 0GB Micro SD/M2, Graphics: AMD Phoenix1, Audio: AMD Rembrandt Radeon HD Audio, Network: Realtek RTL8111/8168/8411 + Qualcomm QCNFA765
OS: Arch rolling, Kernel: 6.6.1-zen1-1-zen (x86_64), Desktop: KDE Plasma, Display Server: X Server 1.21.1.9, OpenCL: OpenCL 2.1 AMD-APP.dbg (3570.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - Platform Profile: low-power - CPU Microcode: 0xa704103 - ACPI Profile: low-power
Graphics Notes: GLAMOR
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable no microcode + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 November 2023 15:32 by user neo_chen.