fatty 36
Processor: Intel 0000 @ 2.50GHz (16 Cores / 32 Threads), Motherboard: Supermicro X10SRA v1.01 (2.0a BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 960GB TOSHIBA-TR150 + 120GB SPCC Solid State + 500GB Samsung SSD 850 + 60GB Toshiba MKNSSDEC60GB, Graphics: MSI NVIDIA GeForce GTX 970 4GB (1101/3505MHz), Audio: Realtek ALC1150, Monitor: Acer X233H, Network: 2 x Intel I210
OS: Fedora 32, Kernel: 5.7.8-200.fc32.x86_64 (x86_64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.100, OpenGL: 4.6.0, Compiler: GCC 10.1.1 20200507 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: BFQ / relatime,rw,seclabel
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x14
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DEBUGINFOD_URLS=https://debuginfod.fedoraproject.org/
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x14
Python Notes: Python 3.10.4
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel 0000 @ 2.50GHz (16 Cores / 32 Threads), Motherboard: Supermicro X10SRA v1.01 (2.0a BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 960GB TOSHIBA TR150 + 120GB SPCC Solid State + 500GB Samsung SSD 850 + 60GB Toshiba MKNSSDEC60GB, Graphics: MSI NVIDIA GeForce GTX 970 4GB, Audio: Realtek ALC1150, Monitor: Acer X233H, Network: 2 x Intel I210
OS: Fedora Linux 36, Kernel: 5.17.8-300.fc36.x86_64 (x86_64), Desktop: Xfce 4.16, Display Server: X Server 1.20.14, Display Driver: NVIDIA 510.68.02, OpenGL: 4.6.0, Compiler: GCC 12.1.1 20220507 + Clang 14.0.0 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1920x1080
Fio is an advanced disk benchmark that depends upon the kernel's AIO access library. Learn more via the OpenBenchmarking.org test page.
PyPerformance is the reference Python performance benchmark suite. Learn more via the OpenBenchmarking.org test page.
This test profile reports the total time of the different average timed test results from PyBench. PyBench reports average test times for different functions such as BuiltinFunctionCalls and NestedForLoops, with this total result providing a rough estimate as to Python's average performance on a given system. This test profile runs PyBench each time for 20 rounds. Learn more via the OpenBenchmarking.org test page.
Processor: Intel 0000 @ 2.50GHz (16 Cores / 32 Threads), Motherboard: Supermicro X10SRA v1.01 (2.0a BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 960GB TOSHIBA-TR150 + 120GB SPCC Solid State + 500GB Samsung SSD 850 + 60GB Toshiba MKNSSDEC60GB, Graphics: MSI NVIDIA GeForce GTX 970 4GB (1101/3505MHz), Audio: Realtek ALC1150, Monitor: Acer X233H, Network: 2 x Intel I210
OS: Fedora 32, Kernel: 5.7.8-200.fc32.x86_64 (x86_64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 440.100, OpenGL: 4.6.0, Compiler: GCC 10.1.1 20200507 + Clang 10.0.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver
Disk Notes: BFQ / relatime,rw,seclabel
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x14
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 July 2020 22:52 by user .
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DEBUGINFOD_URLS=https://debuginfod.fedoraproject.org/
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x14
Python Notes: Python 3.10.4
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 May 2022 20:08 by user .
Processor: Intel 0000 @ 2.50GHz (16 Cores / 32 Threads), Motherboard: Supermicro X10SRA v1.01 (2.0a BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 32GB, Disk: 960GB TOSHIBA TR150 + 120GB SPCC Solid State + 500GB Samsung SSD 850 + 60GB Toshiba MKNSSDEC60GB, Graphics: MSI NVIDIA GeForce GTX 970 4GB, Audio: Realtek ALC1150, Monitor: Acer X233H, Network: 2 x Intel I210
OS: Fedora Linux 36, Kernel: 5.17.8-300.fc36.x86_64 (x86_64), Desktop: Xfce 4.16, Display Server: X Server 1.20.14, Display Driver: NVIDIA 510.68.02, OpenGL: 4.6.0, Compiler: GCC 12.1.1 20220507 + Clang 14.0.0 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: DEBUGINFOD_URLS=https://debuginfod.fedoraproject.org/
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x14
Python Notes: Python 3.10.4
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 May 2022 20:15 by user .