rav1e SFF CompuLab

AMD Ryzen 5 3400G testing with a ASRock A300M-STX (P3.60 BIOS) and AMD Picasso on Ubuntu 19.10 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/1912236-HU-1912196HU08&grr.

rav1e SFF CompuLabProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverCompilerFile-SystemScreen ResolutionIntel Core i7-7500Urav1e Ryzen 3400G UbuntuIntel Core i7-7500U @ 3.50GHz (2 Cores / 4 Threads)Compulab IPC3 v2.0 (5.12_IPC3K.PRD.0.25.4 BIOS)Intel Xeon E3-1200 v6/7th16384MB256GB Micron_1100_MTFDIntel HD 620 (1050MHz)Realtek ALC886Acer P243WIntel I219-LM + 4 x Intel 82574L + Intel I211 + Realtek RTL8822BE 802.11a/b/g/n/acUbuntu 19.105.3.0-24-generic (x86_64)GNOME Shell 3.34.1X Server 1.20.5modesetting 1.20.5GCC 9.2.1 20191008ext41920x1200AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads)ASRock A300M-STX (P3.60 BIOS)AMD Raven/Raven230720MBSamsung SSD 970 PRO 512GBAMD Picasso (1400/1200MHz)AMD Raven/Raven2/FenghuangRealtek RTL8111/8168/84111920x1080OpenBenchmarking.orgProcessor Details- Intel Core i7-7500U: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca- rav1e Ryzen 3400G Ubuntu: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8108102Security Details- Intel Core i7-7500U: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected - rav1e Ryzen 3400G Ubuntu: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected

rav1e SFF CompuLabrav1e: 1rav1e: 5rav1e: 9rav1e: 6Intel Core i7-7500Urav1e Ryzen 3400G Ubuntu0.0850.3490.7000.5620.1750.6411.1910.978OpenBenchmarking.org

rav1e

Speed: 1

OpenBenchmarking.orgFrames Per Second, More Is Betterrav1e 0.2.0Speed: 1Intel Core i7-7500Urav1e Ryzen 3400G Ubuntu0.03940.07880.11820.15760.197SE +/- 0.000, N = 3SE +/- 0.001, N = 30.0850.175

rav1e

Speed: 5

OpenBenchmarking.orgFrames Per Second, More Is Betterrav1e 0.2.0Speed: 5Intel Core i7-7500Urav1e Ryzen 3400G Ubuntu0.14420.28840.43260.57680.721SE +/- 0.002, N = 3SE +/- 0.004, N = 30.3490.641

rav1e

Speed: 9

OpenBenchmarking.orgFrames Per Second, More Is Betterrav1e 0.2.0Speed: 9Intel Core i7-7500Urav1e Ryzen 3400G Ubuntu0.2680.5360.8041.0721.34SE +/- 0.002, N = 3SE +/- 0.010, N = 30.7001.191

rav1e

Speed: 6

OpenBenchmarking.orgFrames Per Second, More Is Betterrav1e 0.2.0Speed: 6Intel Core i7-7500Urav1e Ryzen 3400G Ubuntu0.22010.44020.66030.88041.1005SE +/- 0.002, N = 3SE +/- 0.003, N = 30.5620.978


Phoronix Test Suite v10.8.4