blah
test1
test1
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: HP 3397 (K01 v02.05 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8192MB, Disk: 240GB KINGSTON SA400S3, Graphics: NVIDIA NV106 2GB, Audio: Realtek ALC221, Monitor: LG ULTRAWIDE, Network: Intel 82579LM
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Desktop: Cinnamon 3.8.8, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.3 Mesa 18.3.6, Compiler: GCC 8.3.0 + Clang 7.0.1-8 + LLVM 7.0.1, File-System: ext4, Screen Resolution: 3440x1440
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Selenium
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
test1
Processor: Intel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: HP 3397 (K01 v02.05 BIOS), Chipset: Intel Xeon E3-1200 v2/3rd, Memory: 8192MB, Disk: 240GB KINGSTON SA400S3, Graphics: NVIDIA NV106 2GB, Audio: Realtek ALC221, Monitor: LG ULTRAWIDE, Network: Intel 82579LM
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Desktop: Cinnamon 3.8.8, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.3 Mesa 18.3.6, Compiler: GCC 8.3.0 + Clang 7.0.1-8 + LLVM 7.0.1, File-System: ext4, Screen Resolution: 3440x1440
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x12
Python Notes: Python 2.7.16 + Python 3.7.3
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 24 December 2019 01:32 by user family.