ocerman / zenpower

Zenpower is Linux kernel driver for reading temperature, voltage(SVI2), current(SVI2) and power(SVI2) for AMD Zen family CPUs.
GNU General Public License v2.0
448 stars 45 forks source link

R5 2600 #26

Closed G4E closed 4 years ago

G4E commented 4 years ago

Hello, I have a R5 2600, but it seems that zenpower doesn't recognize it ? Config : CPU : Ryzen 5 2600 MotherBoard : Asrock B450m PRO4 Distribution : ArchLinux Kernel : 5.5.8-zen1-1-zen (Zen Kernel)

[G4E@G4E-pc ~]$ lsmod | grep zenpower
zenpower               16384  0
[G4E@G4E-pc ~]$ sudo zp_read_debug.sh 
Zenpower not found
[G4E@G4E-pc ~]$ sensors zenpower-*
Specified sensor(s) not found!

Edit :

[G4E@G4E-pc ~]$ lscpu
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   43 bits physical, 48 bits virtual
CPU(s):                          12
On-line CPU(s) list:             0-11
Thread(s) per core:              2
Core(s) per socket:              6
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       AuthenticAMD
CPU family:                      23
Model:                           8
Model name:                      AMD Ryzen 5 2600 Six-Core Processor
Stepping:                        2
Frequency boost:                 enabled
CPU MHz:                         2796.196
CPU max MHz:                     3400,0000
CPU min MHz:                     1550,0000
BogoMIPS:                        6799.19
Virtualization:                  AMD-V
L1d cache:                       192 KiB
L1i cache:                       384 KiB
L2 cache:                        3 MiB
L3 cache:                        16 MiB
NUMA node0 CPU(s):               0-11
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full AMD retpoline, IBPB conditional, STIBP disabled, RSB filling
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_ts
                                 c rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_lm cm
                                 p_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw skinit wdt tce topoext perfctr_core perfctr_nb bpext perfctr_llc mwaitx cpb hw_pstat
                                 e sme ssbd sev ibpb vmmcall fsgsbase bmi1 avx2 smep bmi2 rdseed adx smap clflushopt sha_ni xsaveopt xsavec xgetbv1 xsaves clzero irperf xsaveerptr arat npt l
                                 brv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic v_vmsave_vmload vgif overflow_recov succor smca
ocerman commented 4 years ago

Can you try reboot? If that does not help, can you post output of lspci?

G4E commented 4 years ago

I just rebooted. Something interesting :

[tom@tom-pc ~]$ lsmod | grep zenpower
zenpower               16384  0
[tom@tom-pc ~]$ lsmod | grep k10temp
k10temp                16384  0

It seems like I didn't blacklisted properly k10temp, and both modules are loaded at startup.

Edit : I just blacklisted k10temp and rebooted, it works properly now. Sorry for the waste of time !