AMD Ryzen 7 2700X Eight-Core testing with a ASUS TUF GAMING X570-PLUS (5003 BIOS) and Sapphire AMD Radeon RX 7900 XT 20GB on Bazzite 41 via the Phoronix Test Suite.
Processor: AMD Ryzen 7 2700X Eight-Core @ 4.00GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF GAMING X570-PLUS (5003 BIOS), Chipset: AMD 17h, Memory: 64GB, Disk: 2 x 1000GB Sabrent Rocket 4.0 1TB + 4001GB Western Digital WD4005FZBX-0 + 10001GB Western Digital WD101FZBX-00, Graphics: Sapphire AMD Radeon RX 7900 XT 20GB (2219/1249MHz), Audio: Creative Sound Blaster AE-7, Monitor: ASUS VG35V, Network: Intel Wi-Fi 6 AX200
OS: Bazzite 41, Kernel: 6.11.8-305.bazzite.fc41.x86_64 (x86_64), Desktop: GNOME Shell 47.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.2.4 (LLVM 19.1.0 DRM 3.59), OpenCL: OpenCL 2.1 AMD-APP (3625.0), Compiler: GCC 14.2.1 20240912, File-System: btrfs, Screen Resolution: 3440x1440
Kernel Notes: kvm.ignore_msrs=1 kvm.report_ignored_msrs=0 vfio_pci.disable_vga=1 - Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D70401XT-N13
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
GeeXLab is a cross-platform tool for 3D programming and demo creation. The GeeXLab Vulkan Ray-Tracing Demo from Geeks3D.com is a path tracer based demo making use of the Vulkan ray-tracing extensions with supported graphics processors. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 2700X Eight-Core @ 4.00GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF GAMING X570-PLUS (5003 BIOS), Chipset: AMD 17h, Memory: 64GB, Disk: 2 x 1000GB Sabrent Rocket 4.0 1TB + 4001GB Western Digital WD4005FZBX-0 + 10001GB Western Digital WD101FZBX-00, Graphics: Sapphire AMD Radeon RX 7900 XT 20GB (2219/1249MHz), Audio: Creative Sound Blaster AE-7, Monitor: ASUS VG35V, Network: Intel Wi-Fi 6 AX200
OS: Bazzite 41, Kernel: 6.11.8-305.bazzite.fc41.x86_64 (x86_64), Desktop: GNOME Shell 47.1, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.2.4 (LLVM 19.1.0 DRM 3.59), OpenCL: OpenCL 2.1 AMD-APP (3625.0), Compiler: GCC 14.2.1 20240912, File-System: btrfs, Screen Resolution: 3440x1440
Kernel Notes: kvm.ignore_msrs=1 kvm.report_ignored_msrs=0 vfio_pci.disable_vga=1 - Transparent Huge Pages: madvise
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user
Processor Notes: Scaling Governor: acpi-cpufreq conservative (Boost: Disabled) - CPU Microcode: 0x800820d
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D70401XT-N13
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2024 14:35 by user alessandro-shepheard.