new amd
Intel Core i7-6700K testing with a ASUS MAXIMUS VIII RANGER (3802 BIOS) and Sapphire AMD Radeon RX 7600 8GB on Neon 22.04 via the Phoronix Test Suite.
Sapphire AMD Radeon RX 7600
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS MAXIMUS VIII RANGER (3802 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 2000GB TOSHIBA DT01ACA2 + 128GB TS128GSSD320 + 3001GB TOSHIBA DT01ACA3, Graphics: Sapphire AMD Radeon RX 7600 8GB (2356/1124MHz), Audio: Realtek ALC1150, Monitor: ASUS MX239, Network: Intel I219-V
OS: Neon 22.04, Kernel: 6.2.0-37-generic (x86_64), Desktop: KDE Plasma 5.27.9, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 24.0~git2311260600.945288~oibaf~j (git-945288f 2023-11-26 jammy-oibaf-ppa) (LLVM 15.0.7 DRM 3.49), Vulkan: 1.3.267, Compiler: GCC 11.4.0 + Clang 14.0.0-1ubuntu1.1 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-4481LHS-UC2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
GeeXLab Vulkan Ray-Tracing Demo
GeeXLab is a cross-platform tool for 3D programming and demo creation. The GeeXLab Vulkan Ray-Tracing Demo from Geeks3D.com is a path tracer based demo making use of the Vulkan ray-tracing extensions with supported graphics processors. Learn more via the OpenBenchmarking.org test page.
Sapphire AMD Radeon RX 7600
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS MAXIMUS VIII RANGER (3802 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 2000GB TOSHIBA DT01ACA2 + 128GB TS128GSSD320 + 3001GB TOSHIBA DT01ACA3, Graphics: Sapphire AMD Radeon RX 7600 8GB (2356/1124MHz), Audio: Realtek ALC1150, Monitor: ASUS MX239, Network: Intel I219-V
OS: Neon 22.04, Kernel: 6.2.0-37-generic (x86_64), Desktop: KDE Plasma 5.27.9, Display Server: X Server 1.21.1.4, OpenGL: 4.6 Mesa 24.0~git2311260600.945288~oibaf~j (git-945288f 2023-11-26 jammy-oibaf-ppa) (LLVM 15.0.7 DRM 3.49), Vulkan: 1.3.267, Compiler: GCC 11.4.0 + Clang 14.0.0-1ubuntu1.1 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0xf0 - Thermald 2.4.9
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-4481LHS-UC2
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 27 November 2023 17:15 by user ridowan.