AMD Ryzen 7 7840U testing with a Framework FRANMDCP07 (03.03 BIOS) and AMD Phoenix1 on Arch Linux via the Phoronix Test Suite.
Processor: AMD Ryzen 7 7840U @ 5.13GHz (8 Cores / 16 Threads), Motherboard: Framework FRANMDCP07 (03.03 BIOS), Chipset: AMD Device 14e8, Memory: 32GB, Disk: 1024GB Western Digital WD PC SN740 SDDPNQD-1T00, Graphics: AMD Phoenix1, Audio: AMD Rembrandt Radeon HD Audio, Network: MEDIATEK MT7922 802.11ax PCI
OS: Arch Linux, Kernel: 6.7.4-arch1-1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-arch1.1 (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.1 20230801, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Python Notes: Python 3.11.7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
OS: Arch Linux, Kernel: 6.7.4-arch1-1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-arch1.1 (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test runs ParaView benchmarks: an open-source data analytics and visualization application. Paraview describes itself as "an open-source, multi-platform data analysis and visualization application. ParaView users can quickly build visualizations to analyze their data using qualitative and quantitative techniques." Learn more via the OpenBenchmarking.org test page.
Test: Many Spheres - Resolution: 1920 x 1080
AMD Phoenix1 - AMD Ryzen 7 7840U: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.10.1-MPI-Linux-Python3.9-x86_64/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Volume - Resolution: 1920 x 1080
AMD Phoenix1 - AMD Ryzen 7 7840U: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.10.1-MPI-Linux-Python3.9-x86_64/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
Test: Wavelet Contour - Resolution: 1920 x 1080
AMD Phoenix1 - AMD Ryzen 7 7840U: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ParaView-5.10.1-MPI-Linux-Python3.9-x86_64/bin/pvpython-real: error while loading shared libraries: libcrypt.so.1: cannot open shared object file: No such file or directory
The Parboil Benchmarks from the IMPACT Research Group at University of Illinois are a set of throughput computing applications for looking at computing architecture and compilers. Parboil test-cases support OpenMP, OpenCL, and CUDA multi-processing environments. However, at this time the test profile is just making use of the OpenMP and OpenCL test workloads. Learn more via the OpenBenchmarking.org test page.
Test: OpenMP CUTCP
AMD Phoenix1 - AMD Ryzen 7 7840U: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?
This test runs ParaView benchmarks: an open-source data analytics and visualization application. Paraview describes itself as "an open-source, multi-platform data analysis and visualization application. ParaView users can quickly build visualizations to analyze their data using qualitative and quantitative techniques." Learn more via the OpenBenchmarking.org test page.
This test measures the time needed to carry out some sample Git operations on an example, static repository that happens to be a copy of the GNOME GTK tool-kit repository. Learn more via the OpenBenchmarking.org test page.
This is a simple test of the x265 encoder run on the CPU with 1080p and 4K options for H.265 video encode performance with x265. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 7840U @ 5.13GHz (8 Cores / 16 Threads), Motherboard: Framework FRANMDCP07 (03.03 BIOS), Chipset: AMD Device 14e8, Memory: 32GB, Disk: 1024GB Western Digital WD PC SN740 SDDPNQD-1T00, Graphics: AMD Phoenix1, Audio: AMD Rembrandt Radeon HD Audio, Network: MEDIATEK MT7922 802.11ax PCI
OS: Arch Linux, Kernel: 6.7.4-arch1-1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-arch1.1 (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.1 20230801, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Python Notes: Python 3.11.7
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 February 2024 13:58 by user blackclaws.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 February 2024 14:24 by user blackclaws.
Processor: AMD Ryzen 7 7840U @ 5.13GHz (8 Cores / 16 Threads), Motherboard: Framework FRANMDCP07 (03.03 BIOS), Chipset: AMD Device 14e8, Memory: 32GB, Disk: 1024GB Western Digital WD PC SN740 SDDPNQD-1T00, Graphics: AMD Phoenix1, Audio: AMD Rembrandt Radeon HD Audio, Network: MEDIATEK MT7922 802.11ax PCI
OS: Arch Linux, Kernel: 6.7.4-arch1-1 (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-arch1.1 (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6, File-System: ext4, Screen Resolution: 2256x1504
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=ada,c,c++,d,fortran,go,lto,m2,objc,obj-c++ --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: performance) - Platform Profile: balanced - CPU Microcode: 0xa704103 - ACPI Profile: balanced
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 February 2024 14:27 by user blackclaws.