2400
ARMv8 Cortex-A72 testing on Debian testing via the Phoronix Test Suite.
2400Mhz
Processor: ARMv8 Cortex-A72 @ 2.40GHz (16 Cores), Motherboard: SolidRun LX2160A COM type 7 module, Memory: 14GB, Disk: 1024GB Sabrent + 1000GB Sabrent Rocket Q + 5001GB Seagate ST5000LM000-2AN1 + 6001GB Elements 25A3 + 64GB EC2QT + 63GB DF4064
OS: Debian testing, Kernel: 5.4.41v5-recomp-00001-g4ad10ad304b3-dirty (aarch64), Display Server: X Server 1.20.7, Compiler: GCC 10.1.0, File-System: f2fs
Processor Notes: Scaling Governor: qoriq_cpufreq ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
2400Mhz
Processor: ARMv8 Cortex-A72 @ 2.40GHz (16 Cores), Motherboard: SolidRun LX2160A COM type 7 module, Memory: 14GB, Disk: 1024GB Sabrent + 1000GB Sabrent Rocket Q + 5001GB Seagate ST5000LM000-2AN1 + 6001GB Elements 25A3 + 64GB EC2QT + 63GB DF4064
OS: Debian testing, Kernel: 5.4.41v5-recomp-00001-g4ad10ad304b3-dirty (aarch64), Display Server: X Server 1.20.7, Compiler: GCC 10.1.0, File-System: f2fs
Processor Notes: Scaling Governor: qoriq_cpufreq ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + tsx_async_abort: Not affected
Testing initiated at 26 May 2020 12:55 by user poople.