test0008
KVM testing on CentOS Linux 7 via the Phoronix Test Suite.
ARMv8 Cortex-A72
Processor: ARMv8 Cortex-A72 (2 Cores), Motherboard: QEMU KVM Virtual Machine v1.0 (0.0.0 BIOS), Memory: 1 x 7168 MB RAM QEMU, Disk: 39GB, Graphics: virtiodrmfb
OS: CentOS Linux 7, Kernel: 4.14.0-115.5.1.el7a.aarch64 (aarch64) 20190204, Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Compiler Notes: --build=aarch64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: cppc_cpufreq performance
Security Notes: meltdown: Mitigation of PTI + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: BP hardening: SMCC workaround
Rust Prime Benchmark
Based on petehunt/rust-benchmark, this is a prime number benchmark that is multi-threaded and written in Rustlang. Learn more via the OpenBenchmarking.org test page.
ARMv8 Cortex-A72
Processor: ARMv8 Cortex-A72 (2 Cores), Motherboard: QEMU KVM Virtual Machine v1.0 (0.0.0 BIOS), Memory: 1 x 7168 MB RAM QEMU, Disk: 39GB, Graphics: virtiodrmfb
OS: CentOS Linux 7, Kernel: 4.14.0-115.5.1.el7a.aarch64 (aarch64) 20190204, Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Compiler Notes: --build=aarch64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: cppc_cpufreq performance
Security Notes: meltdown: Mitigation of PTI + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: BP hardening: SMCC workaround
Testing initiated at 7 August 2019 21:18 by user root.