test-furlab
Intel Core i9-9900K testing with a Gigabyte Z390 AORUS PRO WIFI-CF (F12 BIOS) and XFX AMD Radeon RX 6750 XT 12GB on Arch rolling via the Phoronix Test Suite.
XFX AMD Radeon RX 6750 XT
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Gigabyte Z390 AORUS PRO WIFI-CF (F12 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 16GB DDR4-2133MT/s CMK32GX4M2D3600C18, Disk: 1000GB KINGSTON SNV2S1000G + Samsung SSD 970 EVO Plus 500GB + 480GB INTEL SSDSC2CW48 + 250GB Samsung SSD 750, Graphics: XFX AMD Radeon RX 6750 XT 12GB, Audio: Realtek ALC1220, Monitor: BenQ GL2250H + Q32G1WG4, Network: Intel I219-V + Intel Cannon Lake PCH CNVi WiFi
OS: Arch rolling, Kernel: 6.8.8-arch1-1 (x86_64), Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.6-arch1.2 (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP.dbg (3602.0), Compiler: GCC 13.2.1 20240417 + Clang 17.0.6 + LLVM 17.0.6, File-System: ext4, Screen Resolution: 3640x1920
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xea
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
GpuTest
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
XFX AMD Radeon RX 6750 XT
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Gigabyte Z390 AORUS PRO WIFI-CF (F12 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 2 x 16GB DDR4-2133MT/s CMK32GX4M2D3600C18, Disk: 1000GB KINGSTON SNV2S1000G + Samsung SSD 970 EVO Plus 500GB + 480GB INTEL SSDSC2CW48 + 250GB Samsung SSD 750, Graphics: XFX AMD Radeon RX 6750 XT 12GB, Audio: Realtek ALC1220, Monitor: BenQ GL2250H + Q32G1WG4, Network: Intel I219-V + Intel Cannon Lake PCH CNVi WiFi
OS: Arch rolling, Kernel: 6.8.8-arch1-1 (x86_64), Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.6-arch1.2 (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP.dbg (3602.0), Compiler: GCC 13.2.1 20240417 + Clang 17.0.6 + LLVM 17.0.6, File-System: ext4, Screen Resolution: 3640x1920
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xea
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Vulnerable: No microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 May 2024 19:00 by user haru.