AMD Ryzen 5 3400G testing with a ASUS PRIME B450M-A (2006 BIOS) and ASUS AMD Picasso 2GB on Ubuntu 19.10 via the Phoronix Test Suite.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 2 x 8192 MB DDR4-3000MT/s CRUCIAL, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso 2GB (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: SyncMaster, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-46-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server, Vulkan: 1.1.107, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
This simple test profile measures how long it takes to extract the .tar.xz source package of the Mozilla Firefox Web Browser. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 23 December 2020 15:16 by user root.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 23 December 2020 15:28 by user root.
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 2 x 8192 MB DDR4-3000MT/s CRUCIAL, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso 2GB (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: SyncMaster, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-46-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server, Vulkan: 1.1.107, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 23 December 2020 15:33 by user root.