AMD Ryzen 7 5700G testing with a ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS) and MSI AMD Radeon RX 6800 16GB on Fedora Linux 38 via the Phoronix Test Suite.
Processor: AMD Ryzen 7 5700G @ 4.67GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1 + 0GB Mass-Storage, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: C32HG7x, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora Linux 38, Kernel: 6.4.15-200.fc38.x86_64 (x86_64), Desktop: KDE Plasma 5.27.7, Display Server: X Server 1.20.14, OpenGL: 4.6 Mesa 23.3.0-devel (LLVM 16.0.6 DRM 3.52), OpenCL: OpenCL 2.1 AMD-APP (3558.0), Compiler: GCC 13.2.1 20230728 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa50000d
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a benchmark of Strange Brigade running under Steam Play (Proton) on Linux. The test profile assumes you have a Steam account, have Steam installed for the system, and that the game is already purchased/installed. This automates the process of executing the game and using a standardized scene. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 7 5700G @ 4.67GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF GAMING B550-PLUS WIFI II (3205 BIOS), Chipset: AMD Renoir/Cezanne, Memory: 128GB, Disk: 2048GB KINGSTON SKC3000D2048G + 1000GB GIGABYTE GP-AG41TB + 16001GB TOSHIBA MG08ACA1 + 4001GB CT4000MX500SSD1 + 0GB Mass-Storage, Graphics: MSI AMD Radeon RX 6800 16GB, Audio: AMD Navi 21/23, Monitor: C32HG7x, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: Fedora Linux 38, Kernel: 6.4.15-200.fc38.x86_64 (x86_64), Desktop: KDE Plasma 5.27.7, Display Server: X Server 1.20.14, OpenGL: 4.6 Mesa 23.3.0-devel (LLVM 16.0.6 DRM 3.52), OpenCL: OpenCL 2.1 AMD-APP (3558.0), Compiler: GCC 13.2.1 20230728 + Clang 16.0.6 + LLVM 16.0.6, File-System: xfs, Screen Resolution: 2560x1440
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa50000d
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 16368 MB
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 September 2023 20:24 by user ljdm.