compress_800
ARMv8 Cortex-A72 testing on Debian testing via the Phoronix Test Suite.
compress_800
Processor: ARMv8 Cortex-A72 @ 2.00GHz (16 Cores), Motherboard: SolidRun LX2160A COM type 7 module, Memory: 14GB, Disk: 1024GB Sabrent + 1000GB Sabrent Rocket Q + 5001GB Seagate ST5000LM000-2AN1 + 6001GB Elements 25A3 + 64GB EC2QT + 63GB DF4064
OS: Debian testing, Kernel: 5.4.38v9-recomp-00274-ga23f1643ccdd (aarch64), Display Server: X Server 1.20.7, Compiler: GCC 10.1.0, File-System: ext4
Processor Notes: Scaling Governor: qoriq_cpufreq ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
compress_800
Processor: ARMv8 Cortex-A72 @ 2.00GHz (16 Cores), Motherboard: SolidRun LX2160A COM type 7 module, Memory: 14GB, Disk: 1024GB Sabrent + 1000GB Sabrent Rocket Q + 5001GB Seagate ST5000LM000-2AN1 + 6001GB Elements 25A3 + 64GB EC2QT + 63GB DF4064
OS: Debian testing, Kernel: 5.4.38v9-recomp-00274-ga23f1643ccdd (aarch64), Display Server: X Server 1.20.7, Compiler: GCC 10.1.0, File-System: ext4
Processor Notes: Scaling Governor: qoriq_cpufreq ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 17 May 2020 06:03 by user poople.