744812006
x
java-scimark2-osnative
Processor: 4 x Intel Core (Haswell no TSX IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v21.2.4 (1.10.2-1ubuntu1 BIOS), Memory: 1 x 8 GB RAM QEMU, Disk: 20GB, Graphics: cirrusdrmfb
OS: Debian 11, Kernel: 5.10.0-14-amd64 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 11.0.16+8-post-Debian-1deb11u1)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Java SciMark
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
java-scimark2-osnative
Processor: 4 x Intel Core (Haswell no TSX IBRS) (4 Cores), Motherboard: OpenStack Foundation Nova v21.2.4 (1.10.2-1ubuntu1 BIOS), Memory: 1 x 8 GB RAM QEMU, Disk: 20GB, Graphics: cirrusdrmfb
OS: Debian 11, Kernel: 5.10.0-14-amd64 (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1
Java Notes: OpenJDK Runtime Environment (build 11.0.16+8-post-Debian-1deb11u1)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 30 August 2022 12:51 by user root.