blogbenchtest
ARMv8 Cortex-A72 testing with a Pine64 Pinebook Pro and llvmpipe 4GB on Manjaro-ARM 20.03 via the Phoronix Test Suite.
Sabrent
Processor: ARMv8 Cortex-A72 @ 1.42GHz (6 Cores), Motherboard: Pine64 Pinebook Pro, Chipset: Fuzhou Rockchip RK3399, Memory: 4096MB, Disk: 256GB Sabrent + 63GB DA4064, Graphics: llvmpipe 4GB
OS: Manjaro-ARM 20.03, Kernel: 5.6.0-0.42-MANJARO-ARM (aarch64), Desktop: Xfce 4.14, Display Server: X Server 1.20.7, OpenGL: 3.3 Mesa 20.0.2 (LLVM 9.0.1 128 bits), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=aarch64-unknown-linux-gnu --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-fix-cortex-a53-835769 --enable-fix-cortex-a53-843419 --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-unknown-linux-gnu --mandir=/usr/share/man --with-arch=armv8-a --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw
Processor Notes: Scaling Governor: cpufreq-dt schedutil
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
BlogBench
BlogBench is designed to replicate the load of a real-world busy file server by stressing the file-system with multiple threads of random reads, writes, and rewrites. The behavior is mimicked of that of a blog by creating blogs with content and pictures, modifying blog posts, adding comments to these blogs, and then reading the content of the blogs. All of these blogs generated are created locally with fake content and pictures. Learn more via the OpenBenchmarking.org test page.
Sabrent
Processor: ARMv8 Cortex-A72 @ 1.42GHz (6 Cores), Motherboard: Pine64 Pinebook Pro, Chipset: Fuzhou Rockchip RK3399, Memory: 4096MB, Disk: 256GB Sabrent + 63GB DA4064, Graphics: llvmpipe 4GB
OS: Manjaro-ARM 20.03, Kernel: 5.6.0-0.42-MANJARO-ARM (aarch64), Desktop: Xfce 4.14, Display Server: X Server 1.20.7, OpenGL: 3.3 Mesa 20.0.2 (LLVM 9.0.1 128 bits), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=aarch64-unknown-linux-gnu --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-fix-cortex-a53-835769 --enable-fix-cortex-a53-843419 --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-unknown-linux-gnu --mandir=/usr/share/man --with-arch=armv8-a --with-isl --with-linker-hash-style=gnu
Disk Notes: NONE / relatime,rw
Processor Notes: Scaling Governor: cpufreq-dt schedutil
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 5 April 2020 22:56 by user techhab.