You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@openwhisk.apache.org by GitBox <gi...@apache.org> on 2021/03/24 19:41:36 UTC

[GitHub] [openwhisk-wskdeploy] advancedwebdeveloper commented on pull request #1137: Adding Aarch64 support, for Travis

advancedwebdeveloper commented on pull request #1137:
URL: https://github.com/apache/openwhisk-wskdeploy/pull/1137#issuecomment-806116303


   I can tell that both https://github.com/apache/openwhisk-wskdeploy/releases/download/latest/openwhisk_wskdeploy-latest-linux-arm.tgz and https://github.com/apache/openwhisk-wskdeploy/releases/download/latest/openwhisk_wskdeploy-latest-linux-arm64.tgz contain executables, which run on
   
   > # lscpu
   > Architecture:                    aarch64
   > CPU op-mode(s):                  32-bit, 64-bit
   > Byte Order:                      Little Endian
   > CPU(s):                          32
   > On-line CPU(s) list:             0-31
   > Thread(s) per core:              1
   > Core(s) per socket:              32
   > Socket(s):                       1
   > NUMA node(s):                    1
   > Vendor ID:                       APM
   > Model:                           2
   > Model name:                      X-Gene
   > Stepping:                        0x3
   > CPU max MHz:                     3300.0000
   > CPU min MHz:                     363.9700
   > BogoMIPS:                        90.00
   > L1d cache:                       1 MiB
   > L1i cache:                       1 MiB
   > L2 cache:                        4 MiB
   > NUMA node0 CPU(s):               0-31
   > Vulnerability Itlb multihit:     Not affected
   > Vulnerability L1tf:              Not affected
   > Vulnerability Mds:               Not affected
   > Vulnerability Meltdown:          Mitigation; PTI
   > Vulnerability Spec store bypass: Vulnerable
   > Vulnerability Spectre v1:        Mitigation; __user pointer sanitization
   > Vulnerability Spectre v2:        Vulnerable
   > Vulnerability Srbds:             Not affected
   > Vulnerability Tsx async abort:   Not affected
   > Flags:                           fp asimd evtstrm aes pmull sha1 sha2 crc32 cpuid


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
users@infra.apache.org