Intel Xeon E3-1225 V2 testing with a Gigabyte H61M-DS2 (F7 BIOS) and Gigabyte Intel Xeon E3-1200 v2/3rd Gen Core on Kylin v10 via the Phoronix Test Suite.
Processor: Loongson-3A5000-HV (4 Cores), Motherboard: Loongson Loongson-LS3A5000-7A2000-1w-EVB-V1.21 (Loongson-UDK2018-V2.0.05269-beta8 BIOS), Chipset: Loongson LLC Hyper Transport Bridge, Memory: 16GB, Disk: QUANXING N200 256GB, Graphics: llvmpipe, Audio: Loongson LLC Device 7a37, Network: Loongson LLC Device 7a13
OS: Loongnix 20, Kernel: 4.19.0-18-loongson-3 (loongarch64), Display Server: X Server 1.20.11, OpenGL: 3.1 Mesa 18.3.6 (LLVM 8.0 256 bits), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Java Notes: OpenJDK Runtime Environment Loongson11.2.0 (build 11.0.15+10)
Processor: Intel Xeon E3-1225 V2 @ 2.50GHz (4 Cores), Motherboard: Gigabyte H61M-DS2 (F7 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 16GB, Disk: 256GB HYS256, Graphics: Gigabyte Intel Xeon E3-1200 v2/3rd Gen Core (1250MHz), Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Kylin v10, Kernel: 5.10.0-8-generic (x86_64), Display Server: X Server 1.20.9, OpenGL: 4.2 Mesa 20.2.6, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Java Notes: OpenJDK Runtime Environment (build 11.0.14+9-Ubuntu-0kylin2.20.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Processor: Loongson-3A5000-HV (4 Cores), Motherboard: Loongson Loongson-LS3A5000-7A2000-1w-EVB-V1.21 (Loongson-UDK2018-V2.0.05269-beta8 BIOS), Chipset: Loongson LLC Hyper Transport Bridge, Memory: 16GB, Disk: QUANXING N200 256GB, Graphics: llvmpipe, Audio: Loongson LLC Device 7a37, Network: Loongson LLC Device 7a13
OS: Loongnix 20, Kernel: 4.19.0-18-loongson-3 (loongarch64), Display Server: X Server 1.20.11, OpenGL: 3.1 Mesa 18.3.6 (LLVM 8.0 256 bits), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Java Notes: OpenJDK Runtime Environment Loongson11.2.0 (build 11.0.15+10)
Testing initiated at 18 November 2022 09:15 by user liupe.
Processor: Intel Xeon E3-1225 V2 @ 2.50GHz (4 Cores), Motherboard: Gigabyte H61M-DS2 (F7 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 16GB, Disk: 256GB HYS256, Graphics: Gigabyte Intel Xeon E3-1200 v2/3rd Gen Core (1250MHz), Audio: Realtek ALC887-VD, Network: Realtek RTL8111/8168/8411
OS: Kylin v10, Kernel: 5.10.0-8-generic (x86_64), Display Server: X Server 1.20.9, OpenGL: 4.2 Mesa 20.2.6, Vulkan: 1.2.145, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Java Notes: OpenJDK Runtime Environment (build 11.0.14+9-Ubuntu-0kylin2.20.04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 26 May 2023 09:38 by user liupe.