ryzen-5-1600-4000-heaven-fullhd
AMD Ryzen 5 1600 Six-Core testing with a ASRock B450M Pro4 R2.0 (P5.70 BIOS) and AMD Radeon RX 56/64 8GB on Debian via the Phoronix Test Suite.
AMD Radeon RX 56
Processor: AMD Ryzen 5 1600 Six-Core @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M Pro4 R2.0 (P5.70 BIOS), Chipset: AMD 17h, Memory: 2 x 16GB DDR4-3200MT/s F4-3200C16-16GIS, Disk: 1000GB Western Digital WD Blue SN580 1TB + 4001GB Seagate ST4000VN008-2DR1 + 8002GB Western Digital WD80EZAZ-11T + 1000GB CT1000MX500SSD1, Graphics: AMD Radeon RX 56/64 8GB (1620/1100MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: BenQ GW2480, Network: Realtek RTL8111/8168/8411 + Broadcom BCM4360 802.11ac Dual Band
OS: Debian, Kernel: 6.6.15-amd64 (x86_64), Desktop: GNOME Shell 44.8, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-1 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 23.2.1-1 + OpenCL 3.0, Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0x8001138
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D0501400-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
AMD Radeon RX 56
Processor: AMD Ryzen 5 1600 Six-Core @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M Pro4 R2.0 (P5.70 BIOS), Chipset: AMD 17h, Memory: 2 x 16GB DDR4-3200MT/s F4-3200C16-16GIS, Disk: 1000GB Western Digital WD Blue SN580 1TB + 4001GB Seagate ST4000VN008-2DR1 + 8002GB Western Digital WD80EZAZ-11T + 1000GB CT1000MX500SSD1, Graphics: AMD Radeon RX 56/64 8GB (1620/1100MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: BenQ GW2480, Network: Realtek RTL8111/8168/8411 + Broadcom BCM4360 802.11ac Dual Band
OS: Debian, Kernel: 6.6.15-amd64 (x86_64), Desktop: GNOME Shell 44.8, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-1 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 23.2.1-1 + OpenCL 3.0, Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0x8001138
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D0501400-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 March 2024 21:45 by user napandeer.