AMD Ryzen 5 3400G testing with a ASUS PRIME B450M-A (2006 BIOS) and ASUS AMD Picasso on Ubuntu 19.10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 2 x 8192 MB DDR4-3000MT/s CRUCIAL, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: SyncMaster, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-46-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server, Vulkan: 1.1.107, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
This is a benchmark of the TensorFlow Lite implementation focused on TensorFlow machine learning for mobile, IoT, edge, and other cases. The current Linux support is limited to running on CPUs. This test profile is measuring the average inference time. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 May 2022 10:32 by user root.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 May 2022 12:26 by user root.
Processor: AMD Ryzen 5 3400G @ 3.70GHz (4 Cores / 8 Threads), Motherboard: ASUS PRIME B450M-A (2006 BIOS), Chipset: AMD Raven/Raven2, Memory: 2 x 8192 MB DDR4-3000MT/s CRUCIAL, Disk: 29GB INTEL MEMPEK1W032GA + 4 x 6001GB Seagate ST6000VN0033-2EE, Graphics: ASUS AMD Picasso (1400/1500MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: SyncMaster, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 19.10, Kernel: 5.3.0-46-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server, Vulkan: 1.1.107, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1280x800
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x8108109
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 May 2022 13:17 by user root.