tombraider
AMD Ryzen 5 2600X Six-Core testing with a ASUS ROG STRIX B450-F GAMING (3103 BIOS) and Sapphire AMD Radeon RX 56/64 8GB on Arch rolling via the Phoronix Test Suite.
ASUS AMD Radeon RX 56
Processor: AMD Ryzen 7 1700 Eight-Core @ 3.65GHz (8 Cores / 16 Threads), Motherboard: ASUS ROG STRIX B350-F GAMING (5220 BIOS), Chipset: AMD 17h, Memory: 16384MB, Disk: 1024GB XPG GAMMIX S11 Pro + 1024GB ADATA SU800 + 250GB Crucial_CT250MX2, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/945MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: C32HG7x, Network: Intel I211
OS: Fedora 33, Kernel: 5.8.0-0.rc6.20200720git5714ee50bb43.1.fc33.x86_64 (x86_64) 20200721, Desktop: KDE Plasma 5.19.3, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.2.0-devel (LLVM 10.0.0), Vulkan: 1.2.131, Compiler: GCC 10.1.1 20200618, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: acpi-cpufreq performance
Graphics Notes: GLAMOR
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Sapphire AMD Radeon RX 56
Processor: AMD Ryzen 5 2600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASUS ROG STRIX B450-F GAMING (3103 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 240GB ADATA SX8200NP + 275GB Crucial CT275MX3, Graphics: Sapphire AMD Radeon RX 56/64 8GB (1610/880MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: 2590G4 + 2 x HP E243i, Network: Intel I211
OS: Arch rolling, Kernel: 5.9.14-arch1-1 (x86_64), Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 4.6 Mesa 20.3.1 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: ext4, Screen Resolution: 3840x2340
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Graphics Oc Notes: AMD OverDrive GPU Overclock: 2%
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Shadow of the Tomb Raider
Shadow of the Tomb Raider on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Backs up old preferences (in ~/.local/share/feral-interactive/) for the run. Learn more via the OpenBenchmarking.org test page.
ASUS AMD Radeon RX 56
Processor: AMD Ryzen 7 1700 Eight-Core @ 3.65GHz (8 Cores / 16 Threads), Motherboard: ASUS ROG STRIX B350-F GAMING (5220 BIOS), Chipset: AMD 17h, Memory: 16384MB, Disk: 1024GB XPG GAMMIX S11 Pro + 1024GB ADATA SU800 + 250GB Crucial_CT250MX2, Graphics: ASUS AMD Radeon RX 56/64 8GB (1630/945MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: C32HG7x, Network: Intel I211
OS: Fedora 33, Kernel: 5.8.0-0.rc6.20200720git5714ee50bb43.1.fc33.x86_64 (x86_64) 20200721, Desktop: KDE Plasma 5.19.3, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.2.0-devel (LLVM 10.0.0), Vulkan: 1.2.131, Compiler: GCC 10.1.1 20200618, File-System: ext4, Screen Resolution: 2560x1440
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: acpi-cpufreq performance
Graphics Notes: GLAMOR
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 July 2020 21:22 by user Martin.
Sapphire AMD Radeon RX 56
Processor: AMD Ryzen 5 2600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASUS ROG STRIX B450-F GAMING (3103 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 240GB ADATA SX8200NP + 275GB Crucial CT275MX3, Graphics: Sapphire AMD Radeon RX 56/64 8GB (1610/880MHz), Audio: AMD Vega 10 HDMI Audio, Monitor: 2590G4 + 2 x HP E243i, Network: Intel I211
OS: Arch rolling, Kernel: 5.9.14-arch1-1 (x86_64), Display Server: X Server 1.20.10, Display Driver: modesetting 1.20.10, OpenGL: 4.6 Mesa 20.3.1 (LLVM 11.0.0), Vulkan: 1.2.145, Compiler: GCC 10.2.0 + Clang 11.0.0Target:, File-System: ext4, Screen Resolution: 3840x2340
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x800820d
Graphics Notes: GLAMOR
Graphics Oc Notes: AMD OverDrive GPU Overclock: 2%
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 3 January 2021 18:38 by user jasondaigo.