selenium_old_pc
AMD Ryzen 5 1600X Six-Core testing with a Gigabyte AX370-Gaming K5-CF (F51d BIOS) and AMD Radeon RX 6600 8GB on openSUSE 20230201 via the Phoronix Test Suite.
reference run on old pc
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230201, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5123x1440
Selenium
Benchmark: WebXPRT - Browser: Firefox
reference run on old pc: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
Benchmark: Basemark - Browser: Firefox
reference run on old pc: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
Benchmark: StyleBench - Browser: Firefox
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ERROR: test_untitled_test_case (__main__.UntitledTestCase)
reference run on old pc
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 February 2023 10:07 by user vfluegel.
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230201, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5123x1440
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 February 2023 13:22 by user vfluegel.