Dota 2 Test Profile
Intel Core i7-8086K testing with a ASUS PRIME Z370-A (1002 BIOS) and MSI AMD Radeon RX 580 8192MB on Ubuntu 18.04 via the Phoronix Test Suite.
MSI AMD Radeon RX 580
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME Z370-A (1002 BIOS), Chipset: Intel Device 3ec2, Memory: 16384MB, Disk: 525GB SABRENT + 118GB INTEL SSDPEK1W120GA, Graphics: MSI AMD Radeon RX 580 8192MB, Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel Connection
OS: Ubuntu 18.04, Kernel: 4.19.0-999-generic (x86_64) 20180906, Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 4.5 Mesa 18.3.0-devel- padoka PPA (LLVM 8.0.0), File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable Protection
Dota 2
This is a benchmark of Valve's Dota 2 game. The test profile assumes you have a Steam account, have Steam installed for the system, and that you have rights to Dota 2. This automates the process of executing the game and using a standardized time demo. Learn more via the OpenBenchmarking.org test page.
MSI AMD Radeon RX 580
Processor: Intel Core i7-8086K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME Z370-A (1002 BIOS), Chipset: Intel Device 3ec2, Memory: 16384MB, Disk: 525GB SABRENT + 118GB INTEL SSDPEK1W120GA, Graphics: MSI AMD Radeon RX 580 8192MB, Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel Connection
OS: Ubuntu 18.04, Kernel: 4.19.0-999-generic (x86_64) 20180906, Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.19.6, Display Driver: modesetting 1.19.6, OpenGL: 4.5 Mesa 18.3.0-devel- padoka PPA (LLVM 8.0.0), File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance
Graphics Notes: GLAMOR
Security Notes: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled via prctl and seccomp + PTE Inversion; VMX: conditional cache flushes SMT vulnerable Protection
Testing initiated at 8 September 2018 10:58 by user pts.