AMD Ryzen 5 5600X (PPT=112 W, TDC=100 A, EDC=120 A, Boost Override=100 MHz) testing with an Alienware Aurora R10 (2.2.2 BIOS) and Dell Radeon RX 6700 XT 12 GB on Ubuntu 21.10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 5600X 6-Core @ 3.70GHz (6 Cores / 12 Threads), Motherboard: Alienware 0TYR0X (2.2.2 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Western Digital WDS100T2B0C-00PXH0, Graphics: AMD Radeon RX 6700/6700 XT / 6800M 12GB (2725/1000MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG TV SSCR2, Network: Realtek Device 2600 + Intel Wi-Fi 6 AX200
OS: Ubuntu 21.10, Kernel: 5.13.0-21-generic (x86_64), Desktop: GNOME Shell 40.5, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 21.2.2 (LLVM 12.0.1), Vulkan: 1.2.182, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Shadow of the Tomb Raider on Steam. The test profile assumes you have a Steam account, have Steam installed for the system, and that you own a copy of this game. This automates the process of executing the game and using its built-in benchmark mode. Backs up old preferences (in ~/.local/share/feral-interactive/) for the run. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 16:44 by user tad.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 17:25 by user tad.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 18:00 by user tad.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 18:36 by user tad.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 19:10 by user tad.
Processor: AMD Ryzen 5 5600X 6-Core @ 3.70GHz (6 Cores / 12 Threads), Motherboard: Alienware 0TYR0X (2.2.2 BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Western Digital WDS100T2B0C-00PXH0, Graphics: AMD Radeon RX 6700/6700 XT / 6800M 12GB (2725/1000MHz), Audio: AMD Navi 21 HDMI Audio, Monitor: LG TV SSCR2, Network: Realtek Device 2600 + Intel Wi-Fi 6 AX200
OS: Ubuntu 21.10, Kernel: 5.13.0-21-generic (x86_64), Desktop: GNOME Shell 40.5, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 21.2.2 (LLVM 12.0.1), Vulkan: 1.2.182, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0xa201016
Graphics Notes: BAR1 / Visible vRAM Size: 12272 MB
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 November 2021 19:44 by user tad.