AMD Ryzen 5 3600 6-Core testing with a ASUS TUF B450-PRO GAMING (4202 BIOS) and Sapphire AMD Radeon RX 480 4GB on Arch rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 5 3600 6-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF B450-PRO GAMING (4202 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 1000GB KINGSTON SA2000M81000G + 500GB Western Digital WD5000AAKX-6 + 1000GB TOSHIBA MQ01ABD1 + 500GB Western Digital WD5000AZRX-0 + 1000GB Western Digital WDS100T2B0A + 4 x 0GB MassStorageClass, Graphics: Sapphire AMD Radeon RX 480 4GB, Audio: AMD Ellesmere HDMI Audio, Monitor: M2362D + Acer VG240Y, Network: Realtek RTL8111/8168/8411
OS: Arch rolling, Kernel: 6.5.9-arch2-1 (x86_64), Desktop: KDE Plasma 5.27.9, Display Server: X Server 1.21.1.9 + Wayland, OpenGL: 4.6 Mesa 23.2.1-arch1.2 (LLVM 16.0.6 DRM 3.54), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 3840x1537
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Python Notes: Python 3.11.5
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a test of GLmark2, a basic OpenGL and OpenGL ES 2.0 benchmark supporting various windowing/display back-ends. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 3600 6-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF B450-PRO GAMING (4202 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 1000GB KINGSTON SA2000M81000G + 500GB Western Digital WD5000AAKX-6 + 1000GB TOSHIBA MQ01ABD1 + 500GB Western Digital WD5000AZRX-0 + 1000GB Western Digital WDS100T2B0A + 4 x 0GB MassStorageClass, Graphics: Sapphire AMD Radeon RX 480 4GB, Audio: AMD Ellesmere HDMI Audio, Monitor: M2362D + Acer VG240Y, Network: Realtek RTL8111/8168/8411
OS: Arch rolling, Kernel: 6.5.9-arch2-1 (x86_64), Desktop: KDE Plasma 5.27.9, Display Server: X Server 1.21.1.9 + Wayland, OpenGL: 4.6 Mesa 23.2.1-arch1.2 (LLVM 16.0.6 DRM 3.54), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 3840x1537
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Python Notes: Python 3.11.5
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 November 2023 18:46 by user vikiny.