AMD Ryzen Threadripper 2990WX 32-Core testing with a ASUS ROG ZENITH EXTREME (1701 BIOS) and Gigabyte AMD Radeon RX 570 4GB on Ubuntu 20.10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 4096 MB - vBIOS Version: xxx-xxx-xxx
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen Threadripper 2990WX 32-Core @ 3.00GHz (32 Cores / 64 Threads), Motherboard: ASUS ROG ZENITH EXTREME (1701 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: Samsung SSD 970 EVO 500GB + 250GB Western Digital WDS250G2X0C-00L350, Graphics: Gigabyte AMD Radeon RX 570 4GB (1244/1750MHz), Audio: Realtek ALC1220, Monitor: MX279, Network: Intel I211 + Qualcomm Atheros QCA6174 802.11ac + Wilocity Wil6200 802.11ad
OS: Ubuntu 20.10, Kernel: 5.8.0-63-generic (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.1 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 4096 MB - vBIOS Version: xxx-xxx-xxx
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 July 2022 04:36 by user phoronix.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 4096 MB - vBIOS Version: xxx-xxx-xxx
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 July 2022 05:14 by user phoronix.
Processor: AMD Ryzen Threadripper 2990WX 32-Core @ 3.00GHz (32 Cores / 64 Threads), Motherboard: ASUS ROG ZENITH EXTREME (1701 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: Samsung SSD 970 EVO 500GB + 250GB Western Digital WDS250G2X0C-00L350, Graphics: Gigabyte AMD Radeon RX 570 4GB (1244/1750MHz), Audio: Realtek ALC1220, Monitor: MX279, Network: Intel I211 + Qualcomm Atheros QCA6174 802.11ac + Wilocity Wil6200 802.11ad
OS: Ubuntu 20.10, Kernel: 5.8.0-63-generic (x86_64), Desktop: GNOME Shell 3.38.1, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.2.1 (LLVM 11.0.0), Vulkan: 1.2.131, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 4096 MB - vBIOS Version: xxx-xxx-xxx
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 July 2022 05:35 by user phoronix.