GPU Comparison
Intel Core i9-7900X testing with a ASUS PRIME X299-DELUXE (3601 BIOS) and Sapphire AMD Radeon RX 6700 XT 12GB on Arch rolling via the Phoronix Test Suite.
Vega 64 Stock
Processor: Intel Core i9-7900X @ 4.50GHz (10 Cores / 20 Threads), Motherboard: ASUS PRIME X299-DELUXE (3601 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 1024GB INTEL SSDPEKNW010T8 + 256GB Western Digital WDS256G1X0C-00ENX0 + 4001GB Western Digital WD4004FZWX-0 + 250GB Hitachi HTS54252, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/945MHz), Audio: Intel 200 PCH HD Audio, Monitor: C27HG7x, Network: Intel I219-V + Intel I211 + Qualcomm Atheros QCA6174 802.11ac
OS: Arch rolling, Kernel: 5.19.13-zen1-1-zen (x86_64), Desktop: Sway 1.7, Display Server: X Server 1.20.13 + Wayland, OpenGL: 4.6 Mesa 22.1.7 (LLVM 14.0.6 DRM 3.47), OpenCL: OpenCL 1.1 Mesa 22.1.7 + OpenCL 2.1 AMD-APP (3486.0), Vulkan: 1.3.211, Compiler: GCC 12.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: btrfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS="-j20 -fuse-ld=mold"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006a08
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB - vBIOS Version: 115-D050PIL-100
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
RX 6700 XT Stock
Changed Graphics to Sapphire AMD Radeon RX 6700 XT 12GB (2855/1000MHz).
Graphics Change: BAR1 / Visible vRAM Size: 12272 MB - vBIOS Version: 113-D5121100-O02
Unigine Superposition
This test calculates the average frame-rate within the Superposition demo for the Unigine engine, released in 2017. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Tesseract
Tesseract is a fork of Cube 2 Sauerbraten with numerous graphics and game-play improvements. Tesseract has been in development since 2012 while its first release happened in May of 2014. Learn more via the OpenBenchmarking.org test page.
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
GravityMark
CPU Frequency (CPU0) Monitor
CPU Temperature Monitor
CPU Usage (Summary) Monitor
GPU Frequency Monitor
GPU Memory Usage Monitor
GPU Power Consumption Monitor
GPU Temperature Monitor
GPU Voltage Monitor
Memory Usage Monitor
Vega 64 Stock
Processor: Intel Core i9-7900X @ 4.50GHz (10 Cores / 20 Threads), Motherboard: ASUS PRIME X299-DELUXE (3601 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 1024GB INTEL SSDPEKNW010T8 + 256GB Western Digital WDS256G1X0C-00ENX0 + 4001GB Western Digital WD4004FZWX-0 + 250GB Hitachi HTS54252, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/945MHz), Audio: Intel 200 PCH HD Audio, Monitor: C27HG7x, Network: Intel I219-V + Intel I211 + Qualcomm Atheros QCA6174 802.11ac
OS: Arch rolling, Kernel: 5.19.13-zen1-1-zen (x86_64), Desktop: Sway 1.7, Display Server: X Server 1.20.13 + Wayland, OpenGL: 4.6 Mesa 22.1.7 (LLVM 14.0.6 DRM 3.47), OpenCL: OpenCL 1.1 Mesa 22.1.7 + OpenCL 2.1 AMD-APP (3486.0), Vulkan: 1.3.211, Compiler: GCC 12.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: btrfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS="-j20 -fuse-ld=mold"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006a08
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB - vBIOS Version: 115-D050PIL-100
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 12 October 2022 17:55 by user scrufulufugus.
RX 6700 XT Stock
Processor: Intel Core i9-7900X @ 4.50GHz (10 Cores / 20 Threads), Motherboard: ASUS PRIME X299-DELUXE (3601 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: 1024GB INTEL SSDPEKNW010T8 + 256GB Western Digital WDS256G1X0C-00ENX0 + 4001GB Western Digital WD4004FZWX-0 + 250GB Hitachi HTS54252, Graphics: Sapphire AMD Radeon RX 6700 XT 12GB (2855/1000MHz), Audio: Intel 200 PCH HD Audio, Monitor: C27HG7x, Network: Intel I219-V + Intel I211 + Qualcomm Atheros QCA6174 802.11ac
OS: Arch rolling, Kernel: 5.19.13-zen1-1-zen (x86_64), Desktop: Sway 1.7, Display Server: X Server 1.20.13 + Wayland, OpenGL: 4.6 Mesa 22.1.7 (LLVM 14.0.6 DRM 3.47), OpenCL: OpenCL 1.1 Mesa 22.1.7 + OpenCL 2.1 AMD-APP (3486.0), Vulkan: 1.3.211, Compiler: GCC 12.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: btrfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: always
Environment Notes: MAKEFLAGS="-j20 -fuse-ld=mold"
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2006a08
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB - vBIOS Version: 113-D5121100-O02
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 12 October 2022 19:42 by user scrufulufugus.