fsdf
hjgsfdjhgdj
gdfgdfg
Processor: AMD Ryzen 7 3700U @ 2.30GHz (4 Cores / 8 Threads), Motherboard: LENOVO 20NF0018US (R11ET36W 1.16 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 256GB UMIS RPJTJ256MED1OWX + 500GB Samsung SSD 860, Graphics: AMD Picasso 2GB (1400/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: HA270, Network: Realtek RTL8111/8168/8411 + Intel-AC 9260
OS: Fedora 32, Kernel: 5.6.18-300.fc32.x86_64 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 10.0.0), Compiler: GCC 10.1.1 20200507 + Clang 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 3.8.3
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
ParaView
This test runs ParaView benchmarks: an open-source data analytics and visualization application. Learn more via the OpenBenchmarking.org test page.
gdfgdfg
Processor: AMD Ryzen 7 3700U @ 2.30GHz (4 Cores / 8 Threads), Motherboard: LENOVO 20NF0018US (R11ET36W 1.16 BIOS), Chipset: AMD Raven/Raven2, Memory: 14336MB, Disk: 256GB UMIS RPJTJ256MED1OWX + 500GB Samsung SSD 860, Graphics: AMD Picasso 2GB (1400/1200MHz), Audio: AMD Raven/Raven2/Fenghuang, Monitor: HA270, Network: Realtek RTL8111/8168/8411 + Intel-AC 9260
OS: Fedora 32, Kernel: 5.6.18-300.fc32.x86_64 (x86_64), Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.1.1 (LLVM 10.0.0), Compiler: GCC 10.1.1 20200507 + Clang 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Python Notes: Python 3.8.3
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 June 2020 11:42 by user loveattavk.