AMD Ryzen 5 3600 6-Core testing with a ASRock B450M-HDV R4.0 (P7.40 BIOS) and Sapphire AMD Radeon RX 5700 XT 8GB on Ubuntu 24.10 via the Phoronix Test Suite.
Processor: AMD Ryzen 5 3600 6-Core @ 4.44GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M-HDV R4.0 (P7.40 BIOS), Chipset: AMD Starship/Matisse, Memory: 2 x 8GB DDR4-3000MT/s F4-3000C16-8GISB, Disk: 2000GB Western Digital WD Blue SN570 2TB + 160GB INTEL SSDSA2M160 + 60GB OCZ VERTEX2 + 500GB Samsung SSD 860 + 4001GB Seagate ST4000VN008-2DR1, Graphics: Sapphire AMD Radeon RX 5700 XT 8GB, Audio: AMD Navi 10 HDMI Audio, Monitor: 2 x HP Z27, Network: Realtek RTL8111/8168/8211/8411
OS: Ubuntu 24.10, Kernel: 6.11.0-1007-lowlatency (x86_64), Desktop: GNOME Shell 47.0, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.3.4 kisak-mesa PPA (LLVM 19.1.1 DRM 3.58), OpenCL: OpenCL 1.1 Mesa 24.3.4 kisak-mesa PPA + OpenCL 3.0, Compiler: GCC 14.2.0 + Clang 19.1.1, File-System: ext4, Screen Resolution: 7680x2160
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 3600 6-Core @ 4.44GHz (6 Cores / 12 Threads), Motherboard: ASRock B450M-HDV R4.0 (P7.40 BIOS), Chipset: AMD Starship/Matisse, Memory: 2 x 8GB DDR4-3000MT/s F4-3000C16-8GISB, Disk: 2000GB Western Digital WD Blue SN570 2TB + 160GB INTEL SSDSA2M160 + 60GB OCZ VERTEX2 + 500GB Samsung SSD 860 + 4001GB Seagate ST4000VN008-2DR1, Graphics: Sapphire AMD Radeon RX 5700 XT 8GB, Audio: AMD Navi 10 HDMI Audio, Monitor: 2 x HP Z27, Network: Realtek RTL8111/8168/8211/8411
OS: Ubuntu 24.10, Kernel: 6.11.0-1007-lowlatency (x86_64), Desktop: GNOME Shell 47.0, Display Server: X Server + Wayland, OpenGL: 4.6 Mesa 24.3.4 kisak-mesa PPA (LLVM 19.1.1 DRM 3.58), OpenCL: OpenCL 1.1 Mesa 24.3.4 kisak-mesa PPA + OpenCL 3.0, Compiler: GCC 14.2.0 + Clang 19.1.1, File-System: ext4, Screen Resolution: 7680x2160
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: amd-pstate-epp powersave (Boost: Enabled EPP: balance_performance) - CPU Microcode: 0x8701021
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Vulnerable + spec_rstack_overflow: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 January 2025 17:47 by user rikky.