AMD Ryzen 5 2400G testing with a MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS) and ASUS AMD Radeon RX 6700/6700 XT/6750 XT / 6800M/6850M on Arch Linux via the Phoronix Test Suite.
Processor: AMD Ryzen 5 2400G @ 3.60GHz (4 Cores / 8 Threads), Motherboard: MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS), Chipset: AMD Raven/Raven2, Memory: 16GB, Disk: KLEVV CRAS C710 M.2 NVMe SSD 512GB + 1000GB Western Digital WD10JPVX-22J, Graphics: ASUS AMD Radeon RX 6700/6700 XT/6750 XT / 6800M/6850M, Audio: AMD Navi 21/23, Monitor: VG280K, Network: Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 6.6.1-arch1-1 (x86_64), Display Server: X Server 1.21.1.4, OpenCL: OpenCL 2.1 AMD-APP.dbg (3570.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8101016
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles performance with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported as well as HIP for AMD Radeon GPUs and Intel oneAPI for Intel Graphics. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 2400G @ 3.60GHz (4 Cores / 8 Threads), Motherboard: MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS), Chipset: AMD Raven/Raven2, Memory: 16GB, Disk: KLEVV CRAS C710 M.2 NVMe SSD 512GB + 1000GB Western Digital WD10JPVX-22J, Graphics: ASUS AMD Radeon RX 6700/6700 XT/6750 XT / 6800M/6850M, Audio: AMD Navi 21/23, Monitor: VG280K, Network: Realtek RTL8111/8168/8411
OS: Arch Linux, Kernel: 6.6.1-arch1-1 (x86_64), Display Server: X Server 1.21.1.4, OpenCL: OpenCL 2.1 AMD-APP.dbg (3570.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8101016
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 November 2023 04:59 by user neo_chen.