AMD Ryzen 7 3700X 8-Core testing with a ASUS PRIME X570-P (4408 BIOS) and Sapphire AMD Radeon RX 6600 8GB on openSUSE 20241108 via the Phoronix Test Suite.
Processor: AMD Ryzen 7 3700X 8-Core @ 4.43GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME X570-P (4408 BIOS), Chipset: AMD Starship/Matisse, Memory: 32 + 32 + 8 + 8 DDR4-3200MT/s, Disk: 500GB KINGSTON SA2000M8500G + 4001GB Seagate ST4000DM004-2CV1 + 1000GB Western Digital WDS100T2G0A + 2000GB Western Digital WD20EZRZ-00Z + 1000GB Western Digital WD10EZEX-00R, Graphics: Sapphire AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: PL2740HS + BenQ GW2760, Network: Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: openSUSE 20241108, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.6 (LLVM 19.1.3 DRM 3.59), Compiler: GCC 14.2.1 20241007 [revision 4af44f2cf7d281f3e4f3957efce10e8b2ccb2ad3], File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
GpuTest is a cross-platform OpenGL benchmark developed at Geeks3D.com that offers tech demos such as FurMark, TessMark, and other workloads to stress various areas of GPUs and drivers. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 3700X 8-Core @ 4.43GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME X570-P (4408 BIOS), Chipset: AMD Starship/Matisse, Memory: 32 + 32 + 8 + 8 DDR4-3200MT/s, Disk: 500GB KINGSTON SA2000M8500G + 4001GB Seagate ST4000DM004-2CV1 + 1000GB Western Digital WDS100T2G0A + 2000GB Western Digital WD20EZRZ-00Z + 1000GB Western Digital WD10EZEX-00R, Graphics: Sapphire AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: PL2740HS + BenQ GW2760, Network: Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6 AX200
OS: openSUSE 20241108, Kernel: 6.11.6-2-default (x86_64), Desktop: KDE Plasma 6.2.3, Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.6 (LLVM 19.1.3 DRM 3.59), Compiler: GCC 14.2.1 20241007 [revision 4af44f2cf7d281f3e4f3957efce10e8b2ccb2ad3], File-System: btrfs, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 November 2024 08:22 by user toffe.