cs2-35-gpu
AMD Ryzen 7 5700X 8-Core testing with a MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS) and XFX AMD Radeon RX 6800 XT 16GB on ManjaroLinux 23.1.3 via the Phoronix Test Suite.
XFX AMD Radeon RX 6800 XT
Processor: AMD Ryzen 7 5700X 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 1000GB Western Digital WDS100T2B0C + 4001GB Seagate ST4000NE001-2MA1 + 1000GB Western Digital WD10SPZX-22Z, Graphics: XFX AMD Radeon RX 6800 XT 16GB, Audio: AMD Navi 21/23, Network: Realtek RTL8111/8168/8211/8411
OS: ManjaroLinux 23.1.3, Kernel: 6.7.4-2-MANJARO (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-manjaro1.1 (LLVM 16.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP.dbg (3602.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Counter-Strike 2
This is a benchmark of Valve's Counter-Strike 2 game. The test profile assumes you have a Steam account, have Steam installed for the system, and that Counter-Strike 2 is already installed. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
XFX AMD Radeon RX 6800 XT
Processor: AMD Ryzen 7 5700X 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: MSI B350M GAMING PRO (MS-7A39) v1.0 (2.P5 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 1000GB Western Digital WDS100T2B0C + 4001GB Seagate ST4000NE001-2MA1 + 1000GB Western Digital WD10SPZX-22Z, Graphics: XFX AMD Radeon RX 6800 XT 16GB, Audio: AMD Navi 21/23, Network: Realtek RTL8111/8168/8211/8411
OS: ManjaroLinux 23.1.3, Kernel: 6.7.4-2-MANJARO (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-manjaro1.1 (LLVM 16.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP.dbg (3602.0), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 March 2024 19:00 by user trans_fem_zboomer.