ryzen-5-1600-4000-blendercpu
AMD Ryzen 5 1600 Six-Core testing with a ASRock B450M Pro4 R2.0 (P5.70 BIOS) and AMD Radeon RX 56/64 8GB on Debian via the Phoronix Test Suite.
AMD Ryzen 5 1600 Six-Core - AMD Radeon RX 56/64 8GB -
Processor: AMD Ryzen 5 1600 Six-Core @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M Pro4 R2.0 (P5.70 BIOS), Chipset: AMD 17h, Memory: 2 x 16GB DDR4-3200MT/s F4-3200C16-16GIS, Disk: 1000GB Western Digital WD Blue SN580 1TB + 4001GB Seagate ST4000VN008-2DR1 + 8002GB Western Digital WD80EZAZ-11T + 1000GB CT1000MX500SSD1, Graphics: AMD Radeon RX 56/64 8GB (1620/1100MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: BenQ GW2480, Network: Realtek RTL8111/8168/8411 + Broadcom BCM4360 802.11ac Dual Band
OS: Debian, Kernel: 6.6.15-amd64 (x86_64), Desktop: GNOME Shell 44.8, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-1 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 23.2.1-1 + OpenCL 3.0, Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0x8001138
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles performance with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported as well as HIP for AMD Radeon GPUs and Intel oneAPI for Intel Graphics. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 5 1600 Six-Core - AMD Radeon RX 56/64 8GB -
Processor: AMD Ryzen 5 1600 Six-Core @ 4.00GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M Pro4 R2.0 (P5.70 BIOS), Chipset: AMD 17h, Memory: 2 x 16GB DDR4-3200MT/s F4-3200C16-16GIS, Disk: 1000GB Western Digital WD Blue SN580 1TB + 4001GB Seagate ST4000VN008-2DR1 + 8002GB Western Digital WD80EZAZ-11T + 1000GB CT1000MX500SSD1, Graphics: AMD Radeon RX 56/64 8GB (1620/1100MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: BenQ GW2480, Network: Realtek RTL8111/8168/8411 + Broadcom BCM4360 802.11ac Dual Band
OS: Debian, Kernel: 6.6.15-amd64 (x86_64), Desktop: GNOME Shell 44.8, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-1 (LLVM 17.0.6 DRM 3.54), OpenCL: OpenCL 1.1 Mesa 23.2.1-1 + OpenCL 3.0, Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0x8001138
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 March 2024 22:02 by user napandeer.