14d2 AMD Ryzen 7 5800X3D 8-Core testing with a MSI B450 TOMAHAWK (MS-7C02) v1.0 (1.J1 BIOS) and AMD Radeon RX 6700 XT 12GB on Fedora Linux 39 via the Phoronix Test Suite.
HTML result view exported from: https://openbenchmarking.org/result/2401318-BJON-14D226395 .
14d2 Processor Motherboard Chipset Memory Disk Graphics Audio Monitor Network OS Kernel Desktop Display Server OpenGL OpenCL Compiler File-System Screen Resolution 131 132 AMD Ryzen 7 5800X3D 8-Core @ 3.40GHz (8 Cores / 16 Threads) MSI B450 TOMAHAWK (MS-7C02) v1.0 (1.J1 BIOS) AMD Starship/Matisse 32GB Western Digital WD_BLACK SN850X 1000GB + 3001GB Seagate ST3000DM008-2DM1 + 8002GB Seagate ST8000DM004-2CX1 + 1000GB Samsung SSD 860 AMD Radeon RX 6700 XT 12GB AMD Navi 21/23 VG271U Realtek RTL8111/8168/8411 + Intel Wi-Fi 6 AX200 Fedora Linux 39 6.6.13-200.fc39.x86_64 (x86_64) KDE Plasma 5.27.10 X Server 1.20.14 + Wayland 4.6 Mesa 23.3.4 (LLVM 17.0.6 DRM 3.54) OpenCL 2.1 AMD-APP (3590.0) GCC 13.2.1 20231205 btrfs 2560x1440 OpenBenchmarking.org Kernel Details - amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: madvise Processor Details - Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa20120a Graphics Details - GLAMOR - BAR1 / Visible vRAM Size: 12272 MB Security Details - SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
14d2 l4d2: 2560 x 1440 - Vulkan 131 132 OpenBenchmarking.org
Phoronix Test Suite v10.8.5