sys_test_blender
sys test with blender fishy cat cpu only with temp monitor
sys_test_blender_run2
Processor: AMD Ryzen 9 7950X3D 16-Core @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X670 AORUS ELITE AX (F6 BIOS), Chipset: AMD Device 14d8, Memory: 62GB, Disk: 2000GB Sabrent Rocket 4.0 Plus, Graphics: GFX1036 512MB, Audio: NVIDIA GA102 HD Audio, Monitor: S24R35xFZ, Network: Realtek RTL8125 2.5GbE + MEDIATEK Device 0616
OS: Ubuntu 22.04, Kernel: 5.19.0-42-generic (x86_64), Desktop: GNOME Shell 42.5, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 22.2.5 (LLVM 15.0.7 DRM 3.47), Vulkan: 1.3.224, Compiler: GCC 11.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa601203
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender
sys_test_blender_run2
Processor: AMD Ryzen 9 7950X3D 16-Core @ 4.20GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X670 AORUS ELITE AX (F6 BIOS), Chipset: AMD Device 14d8, Memory: 62GB, Disk: 2000GB Sabrent Rocket 4.0 Plus, Graphics: GFX1036 512MB, Audio: NVIDIA GA102 HD Audio, Monitor: S24R35xFZ, Network: Realtek RTL8125 2.5GbE + MEDIATEK Device 0616
OS: Ubuntu 22.04, Kernel: 5.19.0-42-generic (x86_64), Desktop: GNOME Shell 42.5, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 22.2.5 (LLVM 15.0.7 DRM 3.47), Vulkan: 1.3.224, Compiler: GCC 11.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa601203
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 May 2023 19:08 by user kianshh.