927
Processor: Unknown @ 2.00GHz (4 Cores), Motherboard: OpenStack Foundation Nova (0.0.0 BIOS), Chipset: Red Hat QEMU PCIe, Memory: 1 x 16384 MB RAM QEMU, Disk: 98GB, Graphics: virtiodrmfb, Network: Red Hat Virtio device
OS: CentOS Linux 7, Kernel: 4.14.0-115.el7a.0.1.aarch64 (aarch64) 20181125, Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=aarch64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: cppc_cpufreq performance
Security Notes: meltdown: Mitigation of PTI + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable
This is a benchmark of Sysbench with CPU and memory sub-tests. Learn more via the OpenBenchmarking.org test page.
Processor: Unknown @ 2.00GHz (4 Cores), Motherboard: OpenStack Foundation Nova (0.0.0 BIOS), Chipset: Red Hat QEMU PCIe, Memory: 1 x 16384 MB RAM QEMU, Disk: 98GB, Graphics: virtiodrmfb, Network: Red Hat Virtio device
OS: CentOS Linux 7, Kernel: 4.14.0-115.el7a.0.1.aarch64 (aarch64) 20181125, Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=aarch64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: cppc_cpufreq performance
Security Notes: meltdown: Mitigation of PTI + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable
Testing initiated at 26 September 2023 22:04 by user .