2022-06-30-1918
ARMv8 Cortex-A72 testing on Debian 11 via the Phoronix Test Suite.
ARMv8 Cortex-A72
Processor: ARMv8 Cortex-A72 @ 1.50GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi Compute Module 4 Rev 1.0, Chipset: Broadcom BCM2711, Memory: 4096MB, Disk: 8GB 8GTF4R
OS: Debian 11, Kernel: 5.15.32-v8+ (aarch64), Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1
Compiler Notes: --build=aarch64-linux-gnu --disable-libquadmath --disable-libquadmath-support --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-fix-cortex-a53-843419 --enable-gnu-unique-object --enable-languages=c,ada,c++,go,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-linux-gnu --program-prefix=aarch64-linux-gnu- --target=aarch64-linux-gnu --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-target-system-zlib=auto -v
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
LeelaChessZero
LeelaChessZero (lc0 / lczero) is a chess engine automated vian neural networks. This test profile can be used for OpenCL, CUDA + cuDNN, and BLAS (CPU-based) benchmarking. Learn more via the OpenBenchmarking.org test page.
Backend: BLAS
ARMv8 Cortex-A72: The test quit with a non-zero exit status. The test quit with a non-zero exit status. The test quit with a non-zero exit status. E: ./lczero: line 4: ./lc0: No such file or directory
TSCP
This is a performance test of TSCP, Tom Kerrigan's Simple Chess Program, which has a built-in performance benchmark. Learn more via the OpenBenchmarking.org test page.
Stockfish
This is a test of Stockfish, an advanced open-source C++11 chess benchmark that can scale up to 512 CPU threads. Learn more via the OpenBenchmarking.org test page.
asmFish
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
m-queens
A solver for the N-queens problem with multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
N-Queens
This is a test of the OpenMP version of a test that solves the N-queens problem. The board problem size is 18. Learn more via the OpenBenchmarking.org test page.
ARMv8 Cortex-A72
Processor: ARMv8 Cortex-A72 @ 1.50GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi Compute Module 4 Rev 1.0, Chipset: Broadcom BCM2711, Memory: 4096MB, Disk: 8GB 8GTF4R
OS: Debian 11, Kernel: 5.15.32-v8+ (aarch64), Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1
Compiler Notes: --build=aarch64-linux-gnu --disable-libquadmath --disable-libquadmath-support --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-fix-cortex-a53-843419 --enable-gnu-unique-object --enable-languages=c,ada,c++,go,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-linux-gnu --program-prefix=aarch64-linux-gnu- --target=aarch64-linux-gnu --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-target-system-zlib=auto -v
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 June 2022 19:18 by user jbennett.