ryzen 3
AMD Ryzen 3 2200G testing with a ASUS PRIME B350M-E (5220 BIOS) and ASUS AMD Radeon Vega / Mobile 2GB on Ubuntu 19.10 via the Phoronix Test Suite.
ryzen 3
Processor: AMD Ryzen 3 2200G @ 3.50GHz (4 Cores), Motherboard: ASUS PRIME B350M-E (5220 BIOS), Chipset: AMD Raven/Raven2, Memory: 6144MB, Disk: 14GB INTEL MEMPEK1W016GA + 64GB Flash Drive, Graphics: ASUS AMD Radeon Vega / Mobile 2GB (1100/1067MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: ASUS PB278, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-13-generic (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.1.6 (LLVM 8.0.1), Compiler: GCC 9.2.1 20190909, File-System: ext4, Screen Resolution: 2560x1440
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Embree
Intel Embree is a collection of high-performance ray-tracing kernels for execution on CPUs. Learn more via the OpenBenchmarking.org test page.
LuxCoreRender
ryzen 3
Processor: AMD Ryzen 3 2200G @ 3.50GHz (4 Cores), Motherboard: ASUS PRIME B350M-E (5220 BIOS), Chipset: AMD Raven/Raven2, Memory: 6144MB, Disk: 14GB INTEL MEMPEK1W016GA + 64GB Flash Drive, Graphics: ASUS AMD Radeon Vega / Mobile 2GB (1100/1067MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: ASUS PB278, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-13-generic (x86_64), Desktop: GNOME Shell 3.34.0, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.1.6 (LLVM 8.0.1), Compiler: GCC 9.2.1 20190909, File-System: ext4, Screen Resolution: 2560x1440
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling
Testing initiated at 29 September 2019 07:03 by user phoronix.