AMD Ryzen 9 5900X 12-Core testing with a Gigabyte X570 AORUS MASTER (F38 BIOS) and AMD Radeon RX 6800 XT 16GB on Debian via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5900X 12-Core @ 4.95GHz (12 Cores / 24 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F38 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Samsung SSD 870, Graphics: AMD Radeon RX 6800 XT 16GB (2575/1000MHz), Audio: AMD Navi 21/23, Monitor: 24GM77, Network: Intel I211 + Realtek RTL8125 2.5GbE
OS: Debian, Kernel: 6.7.9-amd64 (x86_64), Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.5-1 (LLVM 17.0.6 DRM 3.57), Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff usbcore.autosuspend=-1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall" LDFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall" CFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall"
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20102b
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D4120500-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a benchmark of Warsow, a popular open-source first-person shooter. This game uses the QFusion engine. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5900X 12-Core @ 4.95GHz (12 Cores / 24 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F38 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Samsung SSD 870, Graphics: AMD Radeon RX 6800 XT 16GB (2575/1000MHz), Audio: AMD Navi 21/23, Monitor: 24GM77, Network: Intel I211 + Realtek RTL8125 2.5GbE
OS: Debian, Kernel: 6.7.9-amd64 (x86_64), Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 24.0.5-1 (LLVM 17.0.6 DRM 3.57), Compiler: GCC 13.2.0 + Clang 16.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff usbcore.autosuspend=-1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall" LDFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall" CFLAGS="-pipe -march=native -O3 -flto=24 -fno-fat-lto-objects -Wall"
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa20102b
Graphics Notes: BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-D4120500-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 April 2024 18:18 by user ciscon.