AMD Ryzen 5 1600X Six-Core testing with a Gigabyte AX370-Gaming K5-CF (F51d BIOS) and AMD Radeon RX 6600 8GB on openSUSE 20230201 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230201, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5123x1440
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers such as Mozilla Firefox and Google Chrome. Learn more via the OpenBenchmarking.org test page.
Benchmark: WebXPRT - Browser: Firefox
reference run on old pc: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
Benchmark: Basemark - Browser: Firefox
reference run on old pc: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: selenium.common.exceptions.WebDriverException: Message: AbortError: Actor 'MarionetteCommands' destroyed before query 'MarionetteCommandsParent:findElement' was resolved
Benchmark: StyleBench - Browser: Firefox
AMD Ryzen 5 1600X Six-Core - AMD Radeon RX 6600 8GB -: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ERROR: test_untitled_test_case (__main__.UntitledTestCase)
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 February 2023 10:07 by user vfluegel.
Processor: AMD Ryzen 5 1600X Six-Core @ 3.60GHz (6 Cores / 12 Threads), Motherboard: Gigabyte AX370-Gaming K5-CF (F51d BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: 1000GB Samsung SSD 960 EVO 1TB + 1000GB SAMSUNG HD103SJ + 8002GB Seagate ST8000DM004-2CX1 + 2 x 0GB Storage + 4GB USB Flash Disk, Graphics: AMD Radeon RX 6600 8GB, Audio: AMD Navi 21/23, Monitor: 2 x DELL U2520D, Network: Intel I211
OS: openSUSE 20230201, Kernel: 6.1.8-1-default (x86_64), Desktop: KDE Plasma 5.26.5, Display Server: X Server 1.21.1.6 + Wayland, OpenGL: 4.6 Mesa 22.3.4 (LLVM 15.0.7 DRM 3.49), Compiler: GCC 12.2.1 20230124 [revision 193f7e62815b4089dfaed4c2bd34fd4f10209e27] + Clang 15.0.7, File-System: btrfs, Screen Resolution: 5123x1440
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x8001138
Python Notes: Python 2.7.18 + Python 3.10.9
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 February 2023 13:22 by user vfluegel.