AMD Ryzen 7 6810U testing with a Win Element S500+ (1.00 BIOS) and amdgpudrmfb on Alpine Linux v3.20 3.20.3 via the Phoronix Test Suite.
Processor: AMD Ryzen 7 6810U @ 4.77GHz (8 Cores / 16 Threads), Motherboard: Win Element S500+ (1.00 BIOS), Memory: 16GB, Disk: 62GB Ultra Fit, Graphics: amdgpudrmfb, Monitor: M27Q
OS: Alpine Linux v3.20 3.20.3, Kernel: 6.6.49-0-lts (x86_64), Compiler: GCC 13.2.1 20240309, File-System: tmpfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-cet --disable-fixed-point --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-languages=c,c++,d,objc,go,fortran,ada --enable-link-serialization=2 --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - CPU Microcode: 0xa404102
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 6810U @ 4.77GHz (8 Cores / 16 Threads), Motherboard: Win Element S500+ (1.00 BIOS), Memory: 16GB, Disk: 62GB Ultra Fit, Graphics: amdgpudrmfb, Monitor: M27Q
OS: Alpine Linux v3.20 3.20.3, Kernel: 6.6.49-0-lts (x86_64), Compiler: GCC 13.2.1 20240309, File-System: tmpfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-cet --disable-fixed-point --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-languages=c,c++,d,objc,go,fortran,ada --enable-link-serialization=2 --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - CPU Microcode: 0xa404102
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 October 2024 21:33 by user .