AMD Ryzen 9 7950X 16-Core testing with a ASRock X670E Taichi (3.06 BIOS) and AMD Radeon RX 6900 XT 16GB on Gentoo 2.15 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 7950X 16-Core @ 5.88GHz (16 Cores / 32 Threads), Motherboard: ASRock X670E Taichi (3.06 BIOS), Chipset: AMD Device 14d8, Memory: 32GB, Disk: 2 x 1000GB Samsung SSD 970 EVO Plus 1TB + 2000GB Seagate FireCuda 530 ZP2000GM30013 + 120GB Corsair Force 3 + 120GB Corsair Force LS + 1000GB SAMSUNG HD103SJ + 16GB DataTraveler G3, Graphics: AMD Radeon RX 6900 XT 16GB, Audio: AMD Navi 21/23, Monitor: AG493UG7R4, Network: Realtek Killer E3000 2.5GbE + Intel Wi-Fi 6E
OS: Gentoo 2.15, Kernel: 6.10.5-slbi (x86_64), Display Server: X Server 1.21.1.8 + Wayland, OpenGL: 4.6 Mesa 24.2.0, OpenCL: OpenCL 2.1 AMD-APP.dbg (3614.0), Compiler: GCC 14.2.1 20240817 + Clang 18.1.8 + LLVM 18.1.8, File-System: btrfs, Screen Resolution: 5120x1440
Kernel Notes: usbhid.kbpoll=0 usbhid.jspoll=0 usbhid.mousepoll=0 - Transparent Huge Pages: always
Environment Notes: AMD_DEBUG=useaco RADV_PERFTEST=sam
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa601206
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles performance with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported as well as HIP for AMD Radeon GPUs and Intel oneAPI for Intel Graphics. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 7950X 16-Core @ 5.88GHz (16 Cores / 32 Threads), Motherboard: ASRock X670E Taichi (3.06 BIOS), Chipset: AMD Device 14d8, Memory: 32GB, Disk: 2 x 1000GB Samsung SSD 970 EVO Plus 1TB + 2000GB Seagate FireCuda 530 ZP2000GM30013 + 120GB Corsair Force 3 + 120GB Corsair Force LS + 1000GB SAMSUNG HD103SJ + 16GB DataTraveler G3, Graphics: AMD Radeon RX 6900 XT 16GB, Audio: AMD Navi 21/23, Monitor: AG493UG7R4, Network: Realtek Killer E3000 2.5GbE + Intel Wi-Fi 6E
OS: Gentoo 2.15, Kernel: 6.10.5-slbi (x86_64), Display Server: X Server 1.21.1.8 + Wayland, OpenGL: 4.6 Mesa 24.2.0, OpenCL: OpenCL 2.1 AMD-APP.dbg (3614.0), Compiler: GCC 14.2.1 20240817 + Clang 18.1.8 + LLVM 18.1.8, File-System: btrfs, Screen Resolution: 5120x1440
Kernel Notes: usbhid.kbpoll=0 usbhid.jspoll=0 usbhid.mousepoll=0 - Transparent Huge Pages: always
Environment Notes: AMD_DEBUG=useaco RADV_PERFTEST=sam
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa601206
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 August 2024 11:23 by user juftuf.