AMD Ryzen 7 5700X3D 8-Core testing with a ASUS PRIME B450M-A II (4622 BIOS) and XFX AMD Radeon RX 6600 XT 8GB on cachyos rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 7 5700X3D 8-Core @ 4.15GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME B450M-A II (4622 BIOS), Chipset: AMD Starship/Matisse, Memory: 48GB, Disk: 1000GB Western Digital WDS100T2B0C-00PXH0 + 512GB Toshiba KXG60ZNV512G + 128GB LITEONIT LCS-128 + 128GB C400-MTFDDAK128M, Graphics: XFX AMD Radeon RX 6600 XT 8GB (2590/1000MHz), Audio: AMD Navi 21/23, Monitor: M28U, Network: Realtek RTL8111/8168/8211/8411
OS: cachyos rolling, Kernel: 6.12.5-2-cachyos (x86_64), Desktop: GNOME Shell 47.2, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.3.1-cachyos1.6 (LLVM 18.1.8 DRM 3.59), OpenCL: OpenCL 3.0, Compiler: GCC 14.2.1 20240910 + Clang 17.0.6, File-System: btrfs, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.wbrf=1 - Transparent Huge Pages: always
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user MUTTER_DEBUG_DISABLE_TRIPLE_BUFFERING=1 MUTTER_DEBUG_DISABLE_HW_CURSORS=0
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa201210
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 7 5700X3D 8-Core @ 4.15GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME B450M-A II (4622 BIOS), Chipset: AMD Starship/Matisse, Memory: 48GB, Disk: 1000GB Western Digital WDS100T2B0C-00PXH0 + 512GB Toshiba KXG60ZNV512G + 128GB LITEONIT LCS-128 + 128GB C400-MTFDDAK128M, Graphics: XFX AMD Radeon RX 6600 XT 8GB (2590/1000MHz), Audio: AMD Navi 21/23, Monitor: M28U, Network: Realtek RTL8111/8168/8211/8411
OS: cachyos rolling, Kernel: 6.12.5-2-cachyos (x86_64), Desktop: GNOME Shell 47.2, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.3.1-cachyos1.6 (LLVM 18.1.8 DRM 3.59), OpenCL: OpenCL 3.0, Compiler: GCC 14.2.1 20240910 + Clang 17.0.6, File-System: btrfs, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.wbrf=1 - Transparent Huge Pages: always
Environment Notes: MUTTER_DEBUG_KMS_THREAD_TYPE=user MUTTER_DEBUG_DISABLE_TRIPLE_BUFFERING=1 MUTTER_DEBUG_DISABLE_HW_CURSORS=0
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0xa201210
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 17 December 2024 14:47 by user allendale.