2024-08-27
Processor: Phytium D2000/8 S8I @ 2.00GHz (8 Cores), Motherboard: PHYTIUM Phytium D2000, Memory: 16GB, Disk: 256GB Jupiter NWT 716X + 8GB DataTraveler 2.0, Graphics: Jingjia Micro Co JM7200 GPU, Monitor: LI2308FM, Network: 2 x Beijing Wangxun WX1860AL2 + 8 x Beijing Wangxun WX1860AL4
OS: Kylin V10, Kernel: 5.4.18-87.76-generic (aarch64), Display Server: X Server 1.20.8, OpenGL: 3.0, Compiler: GCC 9.3.1 + Clang 10.0.0-4kylin1, File-System: ext4, Screen Resolution: 1920x2160
Kernel Notes: Transparent Huge Pages: always
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: scpi-cpufreq performance
Graphics Notes: EXA
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
This test runs qgears2, which is a test written by Zack Rusin and is based upon cairogears. This test can see how well different rendering backends perform and uses Qt4. Learn more via the OpenBenchmarking.org test page.
Processor: Phytium D2000/8 S8I @ 2.00GHz (8 Cores), Motherboard: PHYTIUM Phytium D2000, Memory: 16GB, Disk: 256GB Jupiter NWT 716X + 8GB DataTraveler 2.0, Graphics: Jingjia Micro Co JM7200 GPU, Monitor: LI2308FM, Network: 2 x Beijing Wangxun WX1860AL2 + 8 x Beijing Wangxun WX1860AL4
OS: Kylin V10, Kernel: 5.4.18-87.76-generic (aarch64), Display Server: X Server 1.20.8, OpenGL: 3.0, Compiler: GCC 9.3.1 + Clang 10.0.0-4kylin1, File-System: ext4, Screen Resolution: 1920x2160
Kernel Notes: Transparent Huge Pages: always
Environment Notes: ZLOG_PROFILE_DEBUG=/var/log/xtx/zlog_debug.log
Processor Notes: Scaling Governor: scpi-cpufreq performance
Graphics Notes: EXA
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 27 August 2024 03:19 by user zkcc.