AMD Ryzen 9 5900X 12-Core testing with a Gigabyte X570 AORUS MASTER (F39d BIOS) and AMD Radeon RX 6800 XT 16GB on Debian via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5900X 12-Core @ 4.95GHz (12 Cores / 24 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F39d BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Samsung SSD 870, Graphics: AMD Radeon RX 6800 XT 16GB (2575/1000MHz), Audio: AMD Navi 21/23, Monitor: 24GM77, Network: Intel I211 + Realtek RTL8125 2.5GbE
OS: Debian, Kernel: 6.12.3-amd64 (x86_64), Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.8-1 (LLVM 19.1.4 DRM 3.59), Compiler: GCC 14.2.0 + Clang 19.1.5, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff usbcore.autosuspend=-1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-pipe -march=native -O3" LDFLAGS="-pipe -march=native -O3" CFLAGS="-pipe -march=native -O3" MESA_VK_WSI_PRESENT_MODE=immediate
Processor Notes: Scaling Governor: amd-pstate-epp performance (Boost: Enabled EPP: performance) - CPU Microcode: 0xa20102b
Graphics Notes: BAR1 / Visible vRAM Size: 16368 MB - vBIOS Version: 113-D4120500-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 9 5900X 12-Core @ 4.95GHz (12 Cores / 24 Threads), Motherboard: Gigabyte X570 AORUS MASTER (F39d BIOS), Chipset: AMD Starship/Matisse, Memory: 16GB, Disk: 1000GB Samsung SSD 870, Graphics: AMD Radeon RX 6800 XT 16GB (2575/1000MHz), Audio: AMD Navi 21/23, Monitor: 24GM77, Network: Intel I211 + Realtek RTL8125 2.5GbE
OS: Debian, Kernel: 6.12.3-amd64 (x86_64), Display Server: X Server 1.21.1.14, OpenGL: 4.6 Mesa 24.2.8-1 (LLVM 19.1.4 DRM 3.59), Compiler: GCC 14.2.0 + Clang 19.1.5, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff usbcore.autosuspend=-1 - Transparent Huge Pages: always
Environment Notes: CXXFLAGS="-pipe -march=native -O3" LDFLAGS="-pipe -march=native -O3" CFLAGS="-pipe -march=native -O3" MESA_VK_WSI_PRESENT_MODE=immediate
Processor Notes: Scaling Governor: amd-pstate-epp performance (Boost: Enabled EPP: performance) - CPU Microcode: 0xa20102b
Graphics Notes: BAR1 / Visible vRAM Size: 16368 MB - vBIOS Version: 113-D4120500-101
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 December 2024 22:47 by user ciscon.