java-app-processor-m5.large
Processor: Intel Xeon Platinum 8175M (1 Core / 2 Threads), Motherboard: Amazon EC2 m5.large (1.0 BIOS), Memory: 8192MB, Disk: 9GB Amazon Elastic Block Store
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, System Layer: KVM
Processor Notes: CPU Microcode: 0x2000065
Java Notes: OpenJDK Runtime Environment (build 1.8.0_232-b09)
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon Platinum 8175M (1 Core / 2 Threads), Motherboard: Amazon EC2 m5.large (1.0 BIOS), Memory: 8192MB, Disk: 9GB Amazon Elastic Block Store
OS: CentOS Linux 7, Kernel: 3.10.0-1062.9.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, System Layer: KVM
Processor Notes: CPU Microcode: 0x2000065
Java Notes: OpenJDK Runtime Environment (build 1.8.0_232-b09)
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 15 December 2019 01:56 by user root.