AMD Ryzen 9 5950X 16-Core testing with a ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS) and MSI AMD Radeon RX 6800 16GB on Fedora 39 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Starship/Matisse, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: AORUS FV43U, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora 39, Kernel: 6.7.10-200.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3590.0), Compiler: GCC 13.2.1 20240316 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a benchmark of Valve's Counter-Strike 2 game. The test profile assumes you have a Steam account, have Steam installed for the system, and that Counter-Strike 2 is already installed. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Starship/Matisse, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: AORUS FV43U, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora 39, Kernel: 6.7.10-200.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.1.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3590.0), Compiler: GCC 13.2.1 20240316 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2024 19:19 by user ljdm.