ospray phoenix
AMD Ryzen 5 8500G testing with a ASRock B650 Pro RS (2.06.AS03 BIOS) and AMD Phoenix2 512MB on Ubuntu 23.10 via the Phoronix Test Suite.
a
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: balance_performance) - CPU Microcode: 0xa708004
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
b
Processor: AMD Ryzen 5 8500G @ 5.08GHz (6 Cores / 12 Threads), Motherboard: ASRock B650 Pro RS (2.06.AS03 BIOS), Chipset: AMD Device 14e8, Memory: 2 x 16GB DRAM-6400MT/s F5-6400J3239G16G, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: AMD Phoenix2 512MB, Audio: AMD Rembrandt Radeon HD Audio, Monitor: MX279, Network: Realtek RTL8125 2.5GbE
OS: Ubuntu 23.10, Kernel: 6.7.3-060703-generic (x86_64), Desktop: GNOME Shell 45.2, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1~git2402040600.8368a9~oibaf~m (git-8368a97 2024-02-04 mantic-oibaf-ppa) (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.0, File-System: ext4, Screen Resolution: 1920x1080
OSPRay
OSPRay Studio
a
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: balance_performance) - CPU Microcode: 0xa708004
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2024 20:09 by user phoronix.
b
Processor: AMD Ryzen 5 8500G @ 5.08GHz (6 Cores / 12 Threads), Motherboard: ASRock B650 Pro RS (2.06.AS03 BIOS), Chipset: AMD Device 14e8, Memory: 2 x 16GB DRAM-6400MT/s F5-6400J3239G16G, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: AMD Phoenix2 512MB, Audio: AMD Rembrandt Radeon HD Audio, Monitor: MX279, Network: Realtek RTL8125 2.5GbE
OS: Ubuntu 23.10, Kernel: 6.7.3-060703-generic (x86_64), Desktop: GNOME Shell 45.2, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1~git2402040600.8368a9~oibaf~m (git-8368a97 2024-02-04 mantic-oibaf-ppa) (LLVM 16.0.6 DRM 3.57), Compiler: GCC 13.2.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate-epp powersave (EPP: balance_performance) - CPU Microcode: 0xa708004
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2024 22:49 by user phoronix.