AMD Ryzen 5 3400G testing with a ASUS PRIME B450M-A (2006 BIOS) and ASUS AMD Picasso 2GB on Ubuntu 19.10 via the Phoronix Test Suite.
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso 2GB (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: ASUS PB278, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-24-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL or CUDA is supported. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso 2GB (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: ASUS PB278, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-24-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 8 December 2019 07:45 by user phoronix.