AMD Ryzen 7 PRO 4750U testing with a LENOVO 20UD0004CD (R1BET76W1.45 BIOS) and AMD Radeon Vega / Mobile 512MB on Arch rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 7 PRO 4750U @ 1.70GHz (8 Cores / 16 Threads), Motherboard: LENOVO 20UD0004CD (R1BET76W1.45 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 32GB, Disk: 1024GB ZHITAI TiPlus7100 1TB + 8002GB VIRTUAL-DISK, Graphics: AMD Radeon Vega / Mobile 512MB (1600/1333MHz), Audio: AMD Renoir Radeon HD Audio, Monitor: DELL U2520DR, Network: 2 x Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 6.12.3-1-cachyos (x86_64), Desktop: KDE Plasma 6.2.4, Display Server: X Server 1.21.1.13 + Wayland, OpenGL: 4.6 Mesa 24.3.1-cachyos1.3 (LLVM 18.1.8 DRM 3.59), OpenCL: OpenCL 2.1 AMD-APP.dbg (3590.0) + OpenCL 3.0 LINUX + OpenCL 3.0 PoCL 6.0 Linux RELOC LLVM 18.1.8 SLEEF DISTRO POCL_DEBUG + OpenCL 3.0, Compiler: GCC 14.2.1 20240910 + Clang 18.1.8 + LLVM 18.1.8, File-System: btrfs, Screen Resolution: 2560x2520
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff nvme_core.default_ps_max_latency_us=100000 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - Platform Profile: performance - CPU Microcode: 0x8600109 - ACPI Profile: performance
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 PRO 4750U @ 1.70GHz (8 Cores / 16 Threads), Motherboard: LENOVO 20UD0004CD (R1BET76W1.45 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 32GB, Disk: 1024GB ZHITAI TiPlus7100 1TB + 8002GB VIRTUAL-DISK, Graphics: AMD Radeon Vega / Mobile 512MB (1600/1333MHz), Audio: AMD Renoir Radeon HD Audio, Monitor: DELL U2520DR, Network: 2 x Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 6.12.3-1-cachyos (x86_64), Desktop: KDE Plasma 6.2.4, Display Server: X Server 1.21.1.13 + Wayland, OpenGL: 4.6 Mesa 24.3.1-cachyos1.3 (LLVM 18.1.8 DRM 3.59), OpenCL: OpenCL 2.1 AMD-APP.dbg (3590.0) + OpenCL 3.0 LINUX + OpenCL 3.0 PoCL 6.0 Linux RELOC LLVM 18.1.8 SLEEF DISTRO POCL_DEBUG + OpenCL 3.0, Compiler: GCC 14.2.1 20240910 + Clang 18.1.8 + LLVM 18.1.8, File-System: btrfs, Screen Resolution: 2560x2520
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff nvme_core.default_ps_max_latency_us=100000 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - Platform Profile: performance - CPU Microcode: 0x8600109 - ACPI Profile: performance
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 December 2024 07:24 by user pomoke.