AMD Ryzen 9 7945HX testing with a Alienware 0DWD2H (1.13.1 BIOS) and AMD Radeon 610M 16GB on cachyos rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 9 7945HX @ 5.46GHz (16 Cores / 32 Threads), Motherboard: Alienware 0DWD2H (1.13.1 BIOS), Chipset: AMD Device 14d8, Memory: 62GB, Disk: PC SN810 NVMe WDC 2048GB + 4001GB CT4000P3SSD8, Graphics: AMD Radeon 610M 16GB (1950/9000MHz), Audio: Realtek ALC3254, Network: Realtek RTL8125 2.5GbE + Qualcomm QCNFA765
OS: cachyos rolling, Kernel: 6.10.10-2-cachyos-lto (x86_64), Desktop: GNOME Shell 46.5, Display Server: X Server 1.21.1.13, Display Driver: NVIDIA 560.35.03, OpenGL: 4.6 Mesa 24.2.2-arch1.4 (LLVM 18.1.8 DRM 3.57), OpenCL: OpenCL 3.0 + OpenCL 2.1 AMD-APP.dbg (3602.0) + OpenCL 3.0 CUDA 12.6.65, Compiler: GCC 14.2.1 20240910 + Clang 18.1.8 + LLVM 18.1.8 + CUDA 12.6, File-System: zfs, Screen Resolution: 2560x1600
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user
Processor Notes: Scaling Governor: amd-pstate-epp performance (Boost: Enabled EPP: performance) - CPU Microcode: 0xa601206
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 512 MB - vBIOS Version: 95.03.2a.00.4c
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Vkpeak is a Vulkan compute benchmark inspired by OpenCL's clpeak. Vkpeak provides Vulkan compute performance measurements for FP16 / FP32 / FP64 / INT16 / INT32 scalar and vec4 performance. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 7945HX @ 5.46GHz (16 Cores / 32 Threads), Motherboard: Alienware 0DWD2H (1.13.1 BIOS), Chipset: AMD Device 14d8, Memory: 62GB, Disk: PC SN810 NVMe WDC 2048GB + 4001GB CT4000P3SSD8, Graphics: AMD Radeon 610M 16GB (1950/9000MHz), Audio: Realtek ALC3254, Network: Realtek RTL8125 2.5GbE + Qualcomm QCNFA765
OS: cachyos rolling, Kernel: 6.10.10-2-cachyos-lto (x86_64), Desktop: GNOME Shell 46.5, Display Server: X Server 1.21.1.13, Display Driver: NVIDIA 560.35.03, OpenGL: 4.6 Mesa 24.2.2-arch1.4 (LLVM 18.1.8 DRM 3.57), OpenCL: OpenCL 3.0 + OpenCL 2.1 AMD-APP.dbg (3602.0) + OpenCL 3.0 CUDA 12.6.65, Compiler: GCC 14.2.1 20240910 + Clang 18.1.8 + LLVM 18.1.8 + CUDA 12.6, File-System: zfs, Screen Resolution: 2560x1600
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user
Processor Notes: Scaling Governor: amd-pstate-epp performance (Boost: Enabled EPP: performance) - CPU Microcode: 0xa601206
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 512 MB - vBIOS Version: 95.03.2a.00.4c
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 September 2024 06:20 by user eirikr1848.