pyperformance zyang 1
Processor: Intel Xeon W-2245 @ 4.50GHz (8 Cores / 16 Threads), Motherboard: LENOVO ThinkStation P520 1036 (S03KT50P BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16 + 8 + 16 + 8 + 8 + 16 + 8 + 16 DDR4-2400MT/s, Disk: 256GB SAMSUNG MZVL2256HCHQ-00BL7 + 4001GB Western Digital WD42EJRX-89B + 2000GB TOSHIBA DT01ACA2 + 124GB DataTraveler 3.0 + 256GB SAMSUNG MZ7LH256 + 2GB P 1.0 + 513GB Storage Device, Graphics: NVIDIA Quadro P400, Audio: Realtek ALC662 rev3, Monitor: ASUS VS239, Network: Intel I219-LM
OS: Ubuntu 22.04, Kernel: 6.5.0-35-generic (x86_64), Display Server: X Server 1.21.1.3, OpenGL: 4.5 Mesa 22.2.5 (LLVM 15.0.6 256 bits), Compiler: GCC 11.4.0 + LLVM 14.0.0 + CUDA 12.5, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: performance) - CPU Microcode: 0x5003605
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Vulnerable; BHI: Vulnerable (Syscall hardening enabled) + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Processor: Intel Xeon W-2245 @ 4.50GHz (8 Cores / 16 Threads), Motherboard: LENOVO ThinkStation P520 1036 (S03KT50P BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 16 + 8 + 16 + 8 + 8 + 16 + 8 + 16 DDR4-2400MT/s, Disk: 256GB SAMSUNG MZVL2256HCHQ-00BL7 + 4001GB Western Digital WD42EJRX-89B + 2000GB TOSHIBA DT01ACA2 + 124GB DataTraveler 3.0 + 256GB SAMSUNG MZ7LH256 + 2GB P 1.0 + 513GB Storage Device, Graphics: NVIDIA Quadro P400, Audio: Realtek ALC662 rev3, Monitor: ASUS VS239, Network: Intel I219-LM
OS: Ubuntu 22.04, Kernel: 6.5.0-35-generic (x86_64), Display Server: X Server 1.21.1.3, OpenGL: 4.5 Mesa 22.2.5 (LLVM 15.0.6 256 bits), Compiler: GCC 11.4.0 + LLVM 14.0.0 + CUDA 12.5, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: performance) - CPU Microcode: 0x5003605
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Vulnerable + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable + retbleed: Vulnerable + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; IBPB: disabled; STIBP: disabled; PBRSB-eIBRS: Vulnerable; BHI: Vulnerable (Syscall hardening enabled) + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 18 July 2024 07:25 by user zyang.