20200630 pts-numpy
AMD Ryzen 5 2400G testing with a ASUS TUF B450M-PRO GAMING (1607 BIOS) and ASUS AMD Radeon Vega / Mobile on Debian 10 via the Phoronix Test Suite.
AMD Ryzen 5 2400G
Processor: AMD Ryzen 5 2400G @ 3.60GHz (4 Cores / 8 Threads), Motherboard: ASUS TUF B450M-PRO GAMING (1607 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 3001GB Western Digital WD30EZRZ-00Z + 2 x 3001GB Western Digital WD30EZRX-00D + 500GB Western Digital WDS500G2B0A + 2000GB EARS-22MVWB0 + 3001GB 724030ALE640, Graphics: ASUS AMD Radeon Vega / Mobile, Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-9-amd64 (x86_64), Compiler: GCC 8.3.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: jfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 3.7.7
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Numpy Benchmark
This is a test to obtain the general Numpy performance. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 5 2400G
Processor: AMD Ryzen 5 2400G @ 3.60GHz (4 Cores / 8 Threads), Motherboard: ASUS TUF B450M-PRO GAMING (1607 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 3001GB Western Digital WD30EZRZ-00Z + 2 x 3001GB Western Digital WD30EZRX-00D + 500GB Western Digital WDS500G2B0A + 2000GB EARS-22MVWB0 + 3001GB 724030ALE640, Graphics: ASUS AMD Radeon Vega / Mobile, Audio: AMD Raven/Raven2/Fenghuang, Network: Realtek RTL8111/8168/8411
OS: Debian 10, Kernel: 4.19.0-9-amd64 (x86_64), Compiler: GCC 8.3.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: jfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 3.7.7
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 June 2020 02:26 by user yosuke.