2950x comparison
AMD Ryzen Threadripper 2950X 16-Core testing with a ASUS PRIME X399-A (0807 BIOS) and XFX AMD Radeon RX 6900 XT 16GB on Arch rolling via the Phoronix Test Suite.
no_spectre
Processor: AMD Ryzen Threadripper 2950X 16-Core @ 4.00GHz (16 Cores / 32 Threads), Motherboard: ASUS PRIME X399-A (0807 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB Western Digital WD1002FAEX-0 + 256GB Samsung SSD 840 + 4001GB Seagate ST4000DM004-2CV1 + 5001GB Expansion Desk, Graphics: XFX AMD Radeon RX 6900 XT 16GB (2660/1000MHz), Audio: AMD 17h, Monitor: M28U + Index HMD, Network: Intel I211
OS: Arch rolling, Kernel: 6.1.2-zen1-1-zen (x86_64), Desktop: Sway 1.7, Display Server: X Server 1.21.1.3 + Wayland, OpenGL: 4.6 Mesa 22.3.2 (LLVM 14.0.6 DRM 3.49), Vulkan: 1.3.230, Compiler: GCC 12.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Disabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
SVT-AV1
This is a benchmark of the SVT-AV1 open-source video encoder/decoder. SVT-AV1 was originally developed by Intel as part of their Open Visual Cloud / Scalable Video Technology (SVT). Development of SVT-AV1 has since moved to the Alliance for Open Media as part of upstream AV1 development. SVT-AV1 is a CPU-based multi-threaded video encoder for the AV1 video format with a sample YUV video file. Learn more via the OpenBenchmarking.org test page.
no_spectre
Processor: AMD Ryzen Threadripper 2950X 16-Core @ 4.00GHz (16 Cores / 32 Threads), Motherboard: ASUS PRIME X399-A (0807 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB Western Digital WD1002FAEX-0 + 256GB Samsung SSD 840 + 4001GB Seagate ST4000DM004-2CV1 + 5001GB Expansion Desk, Graphics: XFX AMD Radeon RX 6900 XT 16GB (2660/1000MHz), Audio: AMD 17h, Monitor: M28U + Index HMD, Network: Intel I211
OS: Arch rolling, Kernel: 6.1.2-zen1-1-zen (x86_64), Desktop: Sway 1.7, Display Server: X Server 1.21.1.3 + Wayland, OpenGL: 4.6 Mesa 22.3.2 (LLVM 14.0.6 DRM 3.49), Vulkan: 1.3.230, Compiler: GCC 12.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-libstdcxx-backtrace --enable-link-serialization=1 --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-build-config=bootstrap-lto --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Disabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 January 2023 22:52 by user zoku88.