stressng_cpu1_old_pc
AMD Ryzen 5 1600X Six-Core testing with a Gigabyte AX370-Gaming K5-CF (F51d BIOS) and AMD Radeon RX 6600 8GB on openSUSE 20230205 via the Phoronix Test Suite.
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230205, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5468x1634
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-mutex --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Stress-NG
Stress-NG is a Linux stress tool developed by Colin King of Canonical. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230205, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5468x1634
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-werror --enable-cet=auto --enable-checking=release --enable-gnu-indirect-function --enable-host-shared --enable-languages=c,c++,objc,fortran,obj-c++,ada,go,d,jit --enable-libphobos --enable-libstdcxx-allocator=new --enable-link-mutex --enable-linux-futex --enable-multilib --enable-offload-defaulted --enable-offload-targets=nvptx-none,amdgcn-amdhsa, --enable-plugin --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-build-config=bootstrap-lto-lean --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 February 2023 16:03 by user vfluegel.