1300x blender
AMD Ryzen 3 1300X testing with a ASRock AB350 Pro4 (P3.20 BIOS) and Sapphire AMD Radeon R7 260X/360 2GB on Ubuntu 20.04 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8001129
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
2
3
Processor: AMD Ryzen 3 1300X @ 3.50GHz (4 Cores), Motherboard: ASRock AB350 Pro4 (P3.20 BIOS), Chipset: AMD 17h, Memory: 8GB, Disk: 128GB ADATA SU800, Graphics: Sapphire AMD Radeon R7 260X/360 2GB, Audio: AMD Tobago HDMI Audio, Monitor: DELL S2409W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.9.0-050900daily20201021-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.5 Mesa 20.0.8 (LLVM 10.0.0), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL, NVIDIA OptiX, and NVIDIA CUDA is supported. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8001129
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2021 15:16 by user phoronix.
2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8001129
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2021 20:31 by user phoronix.
3
Processor: AMD Ryzen 3 1300X @ 3.50GHz (4 Cores), Motherboard: ASRock AB350 Pro4 (P3.20 BIOS), Chipset: AMD 17h, Memory: 8GB, Disk: 128GB ADATA SU800, Graphics: Sapphire AMD Radeon R7 260X/360 2GB, Audio: AMD Tobago HDMI Audio, Monitor: DELL S2409W, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.9.0-050900daily20201021-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.5 Mesa 20.0.8 (LLVM 10.0.0), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8001129
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 February 2021 05:49 by user phoronix.