AMD Ryzen 5 7600X 6-Core testing with a ASUS TUF GAMING B650-PLUS WIFI (0823 BIOS) and XFX AMD Radeon RX 7900 XT 20GB on EndeavourOS rolling via the Phoronix Test Suite.
Processor: AMD Ryzen 5 7600X 6-Core @ 5.45GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF GAMING B650-PLUS WIFI (0823 BIOS), Chipset: AMD Device 14d8, Memory: 32GB, Disk: 2000GB CT2000P3SSD8 + 1000GB Samsung SSD 870 + 2000GB Seagate ST2000DM008-2UB1, Graphics: XFX AMD Radeon RX 7900 XT 20GB (2200/2800MHz), Audio: AMD Navi 31 HDMI/DP, Monitor: 27E1QA + Beyond + DELL 1907FPV, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: EndeavourOS rolling, Kernel: 6.10.3-arch1-1-bsb (x86_64), Desktop: KDE Plasma 6.1.4, Display Server: X Server 1.21.1.13 + Wayland, OpenGL: 4.6 Mesa 24.2.1-arch1.1 (LLVM 18.1.8 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3625.0), Compiler: GCC 14.2.1 20240805 + Clang 18.1.8 + LLVM 18.1.8, File-System: ext4, Screen Resolution: 3840x1602
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa601203
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 20464 MB - vBIOS Version: 102-RAPHAEL-006
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 7600X 6-Core @ 5.45GHz (6 Cores / 12 Threads), Motherboard: ASUS TUF GAMING B650-PLUS WIFI (0823 BIOS), Chipset: AMD Device 14d8, Memory: 32GB, Disk: 2000GB CT2000P3SSD8 + 1000GB Samsung SSD 870 + 2000GB Seagate ST2000DM008-2UB1, Graphics: XFX AMD Radeon RX 7900 XT 20GB (2200/2800MHz), Audio: AMD Navi 31 HDMI/DP, Monitor: 27E1QA + Beyond + DELL 1907FPV, Network: Realtek RTL8125 2.5GbE + MEDIATEK MT7921 802.11ax PCI
OS: EndeavourOS rolling, Kernel: 6.10.3-arch1-1-bsb (x86_64), Desktop: KDE Plasma 6.1.4, Display Server: X Server 1.21.1.13 + Wayland, OpenGL: 4.6 Mesa 24.2.1-arch1.1 (LLVM 18.1.8 DRM 3.57), OpenCL: OpenCL 2.1 AMD-APP (3625.0), Compiler: GCC 14.2.1 20240805 + Clang 18.1.8 + LLVM 18.1.8, File-System: ext4, Screen Resolution: 3840x1602
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Processor Notes: Scaling Governor: amd-pstate-epp performance (EPP: performance) - CPU Microcode: 0xa601203
Graphics Notes: GLAMOR - BAR1 / Visible vRAM Size: 20464 MB - vBIOS Version: 102-RAPHAEL-006
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 September 2024 19:00 by user thomas.