AMD Ryzen 7 2700X Eight-Core testing on Slackware 14.2 x86_64 via the Phoronix Test Suite.
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=9 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 7 2700X Eight-Core @ 4.03GHz (8 Cores / 16 Threads), Chipset: AMD 17h, Memory: 126GB, Disk: Samsung SSD 960 PRO 512GB + 512GB Samsung SSD 850 + 2 x 6001GB TOSHIBA MG04ACA6 + 128GB PLEXTOR PX-128M3, Graphics: AMD Radeon Frontier Edition 16GB (1350/988MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: U24E590, Network: Intel I211 + Qualcomm Atheros Killer E2500
OS: Slackware 14.2 x86_64, Kernel: 5.13.2 (x86_64), Desktop: KDE 4.14.38, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 21.1.5 (LLVM 12.0.1), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.1 + LLVM 12.0.1, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=4 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
OS: Slackware 14.2 x86_64, Kernel: 5.13.5 (x86_64), Desktop: KDE 4.14.38, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 21.1.5 (LLVM 12.0.1), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.1 + LLVM 12.0.1, File-System: ext4, Screen Resolution: 3840x2160
This is a benchmark of Valve's Left 4 Dead 2 game. The test profile assumes you have a Steam account and have Steam installed for the system. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=9 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 July 2021 05:30 by user soul.
Processor: AMD Ryzen 7 2700X Eight-Core @ 4.03GHz (8 Cores / 16 Threads), Chipset: AMD 17h, Memory: 126GB, Disk: Samsung SSD 960 PRO 512GB + 512GB Samsung SSD 850 + 2 x 6001GB TOSHIBA MG04ACA6 + 128GB PLEXTOR PX-128M3, Graphics: AMD Radeon Frontier Edition 16GB (1350/988MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: U24E590, Network: Intel I211 + Qualcomm Atheros Killer E2500
OS: Slackware 14.2 x86_64, Kernel: 5.13.2 (x86_64), Desktop: KDE 4.14.38, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 21.1.5 (LLVM 12.0.1), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.1 + LLVM 12.0.1, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=9 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 July 2021 03:25 by user soul.
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=4 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 July 2021 10:55 by user soul.
Processor: AMD Ryzen 7 2700X Eight-Core @ 4.03GHz (8 Cores / 16 Threads), Chipset: AMD 17h, Memory: 126GB, Disk: Samsung SSD 960 PRO 512GB + 512GB Samsung SSD 850 + 2 x 6001GB TOSHIBA MG04ACA6 + 128GB PLEXTOR PX-128M3, Graphics: AMD Radeon Frontier Edition 16GB (1350/988MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: U24E590, Network: Intel I211 + Qualcomm Atheros Killer E2500
OS: Slackware 14.2 x86_64, Kernel: 5.13.5 (x86_64), Desktop: KDE 4.14.38, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 21.1.5 (LLVM 12.0.1), Vulkan: 1.2.168, Compiler: GCC 10.3.0 + Clang 12.0.1 + LLVM 12.0.1, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.ppfeaturemask=0xFFFD7FFF amdgpu.vm_fragment_size=4 - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 July 2021 12:16 by user soul.