AMD Ryzen 9 3900X web browser benchmarks by Michael Larabel with Mozilla Firefox 68 and Google Chrome 76.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: always-on RSB filling
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASUS ROG CROSSHAIR VIII HERO (WI-FI) (0702 BIOS), Chipset: AMD Device 1480, Memory: 16384MB, Disk: 2000GB Force MP600, Graphics: Sapphire AMD Radeon RX 550 640SP / 560/560X 4GB (1300/1750MHz), Audio: AMD Device aae0, Monitor: ASUS VP28U, Network: Realtek Device 8125 + Intel I211 + Intel Device 2723
OS: Ubuntu 18.04, Kernel: 5.3.0-999-generic (x86_64) 20190725, Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 19.0.2 (LLVM 8.0.0), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 3840x2160
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: always-on RSB filling
Testing initiated at 31 July 2019 20:02 by user phoronix.
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: always-on RSB filling
Testing initiated at 1 August 2019 09:29 by user phoronix.
Processor: AMD Ryzen 9 3900X 12-Core @ 3.80GHz (12 Cores / 24 Threads), Motherboard: ASUS ROG CROSSHAIR VIII HERO (WI-FI) (0702 BIOS), Chipset: AMD Device 1480, Memory: 16384MB, Disk: 2000GB Force MP600, Graphics: Sapphire AMD Radeon RX 550 640SP / 560/560X 4GB (1300/1750MHz), Audio: AMD Device aae0, Monitor: ASUS VP28U, Network: Realtek Device 8125 + Intel I211 + Intel Device 2723
OS: Ubuntu 18.04, Kernel: 5.3.0-999-generic (x86_64) 20190725, Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 19.0.2 (LLVM 8.0.0), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: always-on RSB filling
Testing initiated at 1 August 2019 11:39 by user phoronix.