glmark2-6600xt
Intel Core i7-4770K testing with a ASRock Z87 Extreme6 (P2.90 BIOS) and XFX AMD Radeon RX 6600/6600 XT/6600M 8GB on Arch rolling via the Phoronix Test Suite.
XFX AMD Radeon RX 6600
Processor: Intel Core i7-4770K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z87 Extreme6 (P2.90 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16GB, Disk: 500GB Samsung SSD 860 + 3001GB Seagate ST3000DM007-1WY1 + 1000GB Western Digital WD10EZEX-00K + 320GB Western Digital WD3200BPVT-2, Graphics: XFX AMD Radeon RX 6600/6600 XT/6600M 8GB (2900/1000MHz), Audio: Realtek ALC1150, Monitor: ASUS VP247 + ED242QR A, Network: Intel I217-V + Intel I211 + Intel 7260
OS: Arch rolling, Kernel: 5.14.12-207-tkg-bmq (x86_64), Desktop: Sway 1.6.1, Display Server: X Server 1.20.8 + Wayland, OpenGL: 4.6 Mesa 21.2.3 (LLVM 12.0.1), OpenCL: OpenCL 2.0 AMD-APP.dbg (3305.0), Vulkan: 1.2.182, Compiler: Clang 12.0.1 + LLVM 12.0.1, File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x28
Graphics Notes: GLAMOR
Python Notes: Python 3.9.7
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
GLmark2
This is a test of GLmark2, a basic OpenGL and OpenGL ES 2.0 benchmark supporting various windowing/display back-ends. Learn more via the OpenBenchmarking.org test page.
XFX AMD Radeon RX 6600
Processor: Intel Core i7-4770K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASRock Z87 Extreme6 (P2.90 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 16GB, Disk: 500GB Samsung SSD 860 + 3001GB Seagate ST3000DM007-1WY1 + 1000GB Western Digital WD10EZEX-00K + 320GB Western Digital WD3200BPVT-2, Graphics: XFX AMD Radeon RX 6600/6600 XT/6600M 8GB (2900/1000MHz), Audio: Realtek ALC1150, Monitor: ASUS VP247 + ED242QR A, Network: Intel I217-V + Intel I211 + Intel 7260
OS: Arch rolling, Kernel: 5.14.12-207-tkg-bmq (x86_64), Desktop: Sway 1.6.1, Display Server: X Server 1.20.8 + Wayland, OpenGL: 4.6 Mesa 21.2.3 (LLVM 12.0.1), OpenCL: OpenCL 2.0 AMD-APP.dbg (3305.0), Vulkan: 1.2.182, Compiler: Clang 12.0.1 + LLVM 12.0.1, File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x28
Graphics Notes: GLAMOR
Python Notes: Python 3.9.7
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 15 October 2021 21:24 by user pie.