/tmp/pybench.txt
Xen HVM domU 4.2.amazon testing on Red Hat Enterprise Linux Server 7.7 via the Phoronix Test Suite.
SSE
Processor: Intel Xeon E5-2686 v4 (2 Cores), Motherboard: Xen HVM domU (4.2.amazon BIOS), Memory: 1 x 4096 MB RAM, Disk: 10GB, Graphics: cirrusdrmfb
OS: Red Hat Enterprise Linux Server 7.7, Kernel: 3.10.0-1062.7.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: Xen HVM domU 4.2.amazon
Processor Notes: CPU Microcode: 0xb000038
Python Notes: Python 2.7.5 + Python 3.6.8
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
PyBench
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
SSE
Processor: Intel Xeon E5-2686 v4 (2 Cores), Motherboard: Xen HVM domU (4.2.amazon BIOS), Memory: 1 x 4096 MB RAM, Disk: 10GB, Graphics: cirrusdrmfb
OS: Red Hat Enterprise Linux Server 7.7, Kernel: 3.10.0-1062.7.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1024x768, System Layer: Xen HVM domU 4.2.amazon
Processor Notes: CPU Microcode: 0xb000038
Python Notes: Python 2.7.5 + Python 3.6.8
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 2 January 2020 15:56 by user .