AMD Ryzen 5 3600XT 6-Core testing with a MSI B450 GAMING PLUS MAX (MS-7B86) v3.0 (H.H0 BIOS) and MSI AMD Radeon RX 6600 XT 8GB on NobaraLinux 39 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 3600XT 6-Core @ 4.25GHz (6 Cores / 12 Threads), Motherboard: MSI B450 GAMING PLUS MAX (MS-7B86) v3.0 (H.H0 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB PNY CS3030 1TB SSD + 1000GB SAMSUNG HD103SJ, Graphics: MSI AMD Radeon RX 6600 XT 8GB, Audio: AMD Navi 21/23, Monitor: G2490W1G4 + BenQ XL2410T, Network: Realtek RTL8111/8168/8411
OS: NobaraLinux 39, Kernel: 6.7.0-204.fsync.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 23.3.3 (LLVM 17.0.6 DRM 3.56), OpenCL: OpenCL 1.1 Mesa 23.3.3 + OpenCL 3.0, Compiler: GCC 13.2.1 20231205, File-System: ext4, Screen Resolution: 3840x1080
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 January 2024 08:09 by user flurreh.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 January 2024 09:05 by user flurreh.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 January 2024 09:11 by user flurreh.
Processor: AMD Ryzen 5 3600XT 6-Core @ 4.25GHz (6 Cores / 12 Threads), Motherboard: MSI B450 GAMING PLUS MAX (MS-7B86) v3.0 (H.H0 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB PNY CS3030 1TB SSD + 1000GB SAMSUNG HD103SJ, Graphics: MSI AMD Radeon RX 6600 XT 8GB, Audio: AMD Navi 21/23, Monitor: G2490W1G4 + BenQ XL2410T, Network: Realtek RTL8111/8168/8411
OS: NobaraLinux 39, Kernel: 6.7.0-204.fsync.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 23.3.3 (LLVM 17.0.6 DRM 3.56), OpenCL: OpenCL 1.1 Mesa 23.3.3 + OpenCL 3.0, Compiler: GCC 13.2.1 20231205, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_FORCE_KMS_MODE=simple
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x8701030
Graphics Notes: BAR1 / Visible vRAM Size: 8176 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT enabled with STIBP protection + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 January 2024 09:18 by user flurreh.