AMD Ryzen 9 5950X 16-Core testing with a Gigabyte X570 AORUS XTREME (F34 BIOS) and AMD Radeon RX 6900 XT on Arch rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.27GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X570 AORUS XTREME (F34 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2 x 1000GB GIGABYTE GP-AG41TB, Graphics: AMD Radeon RX 6900 XT (2880/1074MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG ULTRAGEAR + DELL U2719D, Network: Aquantia AQC107 NBase-T/IEEE + Intel I211 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 5.16.1 (x86_64), Desktop: Sway, Display Server: X Server 1.20.13 + Wayland, Vulkan: 1.2.199, Compiler: GCC 11.1.0 + Clang 14.0.0 + LLVM 14.0.0, File-System: btrfs, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Changed Graphics to AMD Radeon RX 6900 XT (2720/1000MHz).
Processor Change: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Changed Graphics to AMD Radeon RX 6900 XT (2880/1074MHz).
GravityMark is a cross-API, cross-platform GPU accelerated benchmark developed by Tellusim. GravityMark aims to exploit the performance of modern GPUs and render hundreds of thousands of objects in real-time all using GPU acceleration. GravityMark supports a variety of graphics rendering APIs and optionally supports accelerated ray-tracing. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.27GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X570 AORUS XTREME (F34 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2 x 1000GB GIGABYTE GP-AG41TB, Graphics: AMD Radeon RX 6900 XT (2880/1074MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG ULTRAGEAR + DELL U2719D, Network: Aquantia AQC107 NBase-T/IEEE + Intel I211 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 5.16.1 (x86_64), Desktop: Sway, Display Server: X Server 1.20.13 + Wayland, Vulkan: 1.2.199, Compiler: GCC 11.1.0 + Clang 14.0.0 + LLVM 14.0.0, File-System: btrfs, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 January 2022 01:02 by user pascher.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.27GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X570 AORUS XTREME (F34 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2 x 1000GB GIGABYTE GP-AG41TB, Graphics: AMD Radeon RX 6900 XT (2720/1000MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG ULTRAGEAR + DELL U2719D, Network: Aquantia AQC107 NBase-T/IEEE + Intel I211 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 5.16.1 (x86_64), Desktop: Sway, Display Server: X Server 1.20.13 + Wayland, Vulkan: 1.2.199, Compiler: GCC 11.1.0 + Clang 14.0.0 + LLVM 14.0.0, File-System: btrfs, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 January 2022 19:58 by user pascher.
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 January 2022 20:09 by user pascher.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.27GHz (16 Cores / 32 Threads), Motherboard: Gigabyte X570 AORUS XTREME (F34 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 2 x 1000GB GIGABYTE GP-AG41TB, Graphics: AMD Radeon RX 6900 XT (2880/1074MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG ULTRAGEAR + DELL U2719D, Network: Aquantia AQC107 NBase-T/IEEE + Intel I211 + Intel Wi-Fi 6 AX200
OS: Arch rolling, Kernel: 5.16.1 (x86_64), Desktop: Sway, Display Server: X Server 1.20.13 + Wayland, Vulkan: 1.2.199, Compiler: GCC 11.1.0 + Clang 14.0.0 + LLVM 14.0.0, File-System: btrfs, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 January 2022 20:19 by user pascher.