AMD Ryzen 9 5950X 16-Core testing with a ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS) and MSI AMD Radeon RX 6800 16GB on Fedora 39 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Starship/Matisse, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: AORUS FV43U, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora 39, Kernel: 6.8.7-200.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.20.14, OpenGL: 4.6 Mesa 24.2.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3590.0), Compiler: GCC 13.2.1 20240316 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Total War: WARHAMMER III on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5950X 16-Core @ 5.08GHz (16 Cores / 32 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Starship/Matisse, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: AORUS FV43U, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora 39, Kernel: 6.8.7-200.fc39.x86_64 (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.20.14, OpenGL: 4.6 Mesa 24.2.0-devel (LLVM 17.0.6 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3590.0), Compiler: GCC 13.2.1 20240316 + Clang 17.0.6 + LLVM 17.0.6, File-System: xfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate schedutil (Boost: Enabled) - CPU Microcode: 0xa20120a
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 May 2024 22:02 by user ljdm.