qemu testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Unknown (4 Cores), Motherboard: QEMU Virtual Machine (edk2-stable202302-for-qemu BIOS), Chipset: Red Hat QEMU PCIe, Memory: 1 x 10 GB RAM QEMU, Disk: 97GB, Graphics: virtio_gpudrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-100-generic (aarch64), Vulkan: 1.3.255, Compiler: GCC 11.4.0 + Clang 14.0.0-1ubuntu1.1 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: qemu
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Numenta Anomaly Benchmark (NAB) is a benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. It is comprised of over 50 labeled real-world and artificial time-series data files plus a novel scoring mechanism designed for real-time applications. This test profile currently measures the time to run various detectors. Learn more via the OpenBenchmarking.org test page.
Processor: Unknown (4 Cores), Motherboard: QEMU Virtual Machine (edk2-stable202302-for-qemu BIOS), Chipset: Red Hat QEMU PCIe, Memory: 1 x 10 GB RAM QEMU, Disk: 97GB, Graphics: virtio_gpudrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-100-generic (aarch64), Vulkan: 1.3.255, Compiler: GCC 11.4.0 + Clang 14.0.0-1ubuntu1.1 + LLVM 14.0.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: qemu
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.10.12
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 March 2024 12:47 by user root.