ph_test1 AMD Ryzen 7 7800X3D 8-Core testing with a Gigabyte B650 GAMING X AX V2 (F3 BIOS) and AMD Radeon RX 7800 XT 16GB on Garuda Soaring via the Phoronix Test Suite.
HTML result view exported from: https://openbenchmarking.org/result/2404212-NE-PHTEST10073 .
ph_test1 Processor Motherboard Chipset Memory Disk Graphics Audio Monitor Network OS Kernel Desktop Display Server OpenGL Compiler File-System Screen Resolution test AMD Ryzen 7 7800X3D 8-Core @ 5.05GHz (8 Cores / 16 Threads) Gigabyte B650 GAMING X AX V2 (F3 BIOS) AMD Device 14d8 32GB 2048GB ADATA FALCON AMD Radeon RX 7800 XT 16GB (2169/1218MHz) AMD Navi 31 HDMI/DP 32G2WG3 Realtek RTL8125 2.5GbE + Realtek RTL8852CE PCIe 802.11ax Garuda Soaring 6.8.7-AMD (x86_64) KDE Plasma 6.0.4 X Server 1.21.1.13 + Wayland 4.6 Mesa 24.0.5-arch1.1 (LLVM 17.0.6 DRM 3.57) GCC 13.2.1 20230801 + Clang 17.0.6 + LLVM 17.0.6 btrfs 1920x1080 OpenBenchmarking.org - Transparent Huge Pages: always - Scaling Governor: amd-pstate-epp powersave (EPP: balance_performance) - CPU Microcode: 0xa601206 - GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-APM6767CL-100 - Python 3.11.8 - gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: eIBRS with unprivileged eBPF + srbds: Not affected + tsx_async_abort: Not affected
ph_test1 glmark2: 1920 x 1080 test 21632 OpenBenchmarking.org
GLmark2 Resolution: 1920 x 1080 OpenBenchmarking.org Score, More Is Better GLmark2 2023.01 Resolution: 1920 x 1080 test 5K 10K 15K 20K 25K 21632
Phoronix Test Suite v10.8.4