AMD Ryzen 7 3700X 8-Core testing with a ASUS PRIME X570-P (4408 BIOS) and Sapphire AMD Radeon RX 6600 8GB on openSUSE 20241108 via the Phoronix Test Suite.
Processor: AMD Ryzen 7 3700X 8-Core @ 4.43GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME X570-P (4408 BIOS), Chipset: AMD Starship/Matisse, Memory: 32 + 32 + 8 + 8 DDR4-3200MT/s, Disk: 500GB KINGSTON SA2000M8500G + 4001GB Seagate ST4000DM004-2CV1 + 1000GB Western Digital WDS100T2G0A + 2000GB Western Digital WD20EZRZ-00Z + 1000GB Western Digital WD10EZEX-00R, Graphics: Sapphire AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: PL2740HS + BenQ GW2760, Network: Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: openSUSE 20241108, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.6 (LLVM 19.1.3 DRM 3.59), Compiler: GCC 14.2.1 20241007 [revision 4af44f2cf7d281f3e4f3957efce10e8b2ccb2ad3], File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test calculates the average frame-rate within the Valley demo for the Unigine engine, released in February 2013. This engine is extremely demanding on the system's graphics card. Unigine Valley relies upon an OpenGL 3 core profile context. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 3700X 8-Core @ 4.43GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME X570-P (4408 BIOS), Chipset: AMD Starship/Matisse, Memory: 32 + 32 + 8 + 8 DDR4-3200MT/s, Disk: 500GB KINGSTON SA2000M8500G + 4001GB Seagate ST4000DM004-2CV1 + 1000GB Western Digital WDS100T2G0A + 2000GB Western Digital WD20EZRZ-00Z + 1000GB Western Digital WD10EZEX-00R, Graphics: Sapphire AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: PL2740HS + BenQ GW2760, Network: Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: openSUSE 20241108, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.6 (LLVM 19.1.3 DRM 3.59), Compiler: GCC 14.2.1 20241007 [revision 4af44f2cf7d281f3e4f3957efce10e8b2ccb2ad3], File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 November 2024 09:18 by user toffe.