2024-08-27
Processor: Phytium D2000/8 S8I @ 2.00GHz (8 Cores), Motherboard: PHYTIUM Phytium D2000, Memory: 16GB, Disk: 256GB Jupiter NWT 716X + 8GB DataTraveler 2.0, Graphics: Jingjia Micro Co JM7200 GPU, Monitor: LI2308FM, Network: 2 x Beijing Wangxun WX1860AL2 + 8 x Beijing Wangxun WX1860AL4
OS: Kylin V10, Kernel: 5.4.18-87.76-generic (aarch64), Display Server: X Server 1.20.8, OpenGL: 3.0, Compiler: GCC 9.3.1 + Clang 10.0.0-4kylin1, File-System: ext4, Screen Resolution: 1920x2160
Kernel Notes: Transparent Huge Pages: always
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: scpi-cpufreq performance
Graphics Notes: EXA
Python Notes: Python 2.7.18 + Python 3.8.10
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
This is a test of GLmark2, a basic OpenGL and OpenGL ES 2.0 benchmark supporting various windowing/display back-ends. Learn more via the OpenBenchmarking.org test page.
Processor: Phytium D2000/8 S8I @ 2.00GHz (8 Cores), Motherboard: PHYTIUM Phytium D2000, Memory: 16GB, Disk: 256GB Jupiter NWT 716X + 8GB DataTraveler 2.0, Graphics: Jingjia Micro Co JM7200 GPU, Monitor: LI2308FM, Network: 2 x Beijing Wangxun WX1860AL2 + 8 x Beijing Wangxun WX1860AL4
OS: Kylin V10, Kernel: 5.4.18-87.76-generic (aarch64), Display Server: X Server 1.20.8, OpenGL: 3.0, Compiler: GCC 9.3.1 + Clang 10.0.0-4kylin1, File-System: ext4, Screen Resolution: 1920x2160
Kernel Notes: Transparent Huge Pages: always
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: scpi-cpufreq performance
Graphics Notes: EXA
Python Notes: Python 2.7.18 + Python 3.8.10
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 August 2024 01:46 by user zkcc.