compilelinuxkernel
Intel Core i5-4570 testing with a ASRock B85M Pro4 (P2.50 BIOS) and AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on Arch Linux via the Phoronix Test Suite.
1st try
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
no_mitigations
Processor: Intel Core i5-4570 @ 3.60GHz (4 Cores), Motherboard: ASRock B85M Pro4 (P2.50 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 8192MB, Disk: 2000GB Hitachi HDS5C302 + 128GB SAMSUNG SSD 830, Graphics: AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1266/2000MHz), Audio: Realtek ALC892, Monitor: BenQ GL2450, Network: Intel I217-V + Qualcomm Atheros AR93xx
OS: Arch Linux, Kernel: 5.1.16-arch1-1-ARCH (x86_64), Desktop: KDE Plasma 5.16.2, Display Server: X Server 1.20.5, Display Driver: amdgpu 19.0.1, OpenGL: 4.5 Mesa 19.2.0-devel (git-22b5ea1648) (LLVM 8.0.0), Compiler: GCC 9.1.0 + Clang 8.0.0 + LLVM 8.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
1st try
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling
Testing initiated at 8 July 2019 14:03 by user thomas.
no_mitigations
Processor: Intel Core i5-4570 @ 3.60GHz (4 Cores), Motherboard: ASRock B85M Pro4 (P2.50 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 8192MB, Disk: 2000GB Hitachi HDS5C302 + 128GB SAMSUNG SSD 830, Graphics: AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1266/2000MHz), Audio: Realtek ALC892, Monitor: BenQ GL2450, Network: Intel I217-V + Qualcomm Atheros AR93xx
OS: Arch Linux, Kernel: 5.1.16-arch1-1-ARCH (x86_64), Desktop: KDE Plasma 5.16.2, Display Server: X Server 1.20.5, Display Driver: amdgpu 19.0.1, OpenGL: 4.5 Mesa 19.2.0-devel (git-22b5ea1648) (LLVM 8.0.0), Compiler: GCC 9.1.0 + Clang 8.0.0 + LLVM 8.0.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled
Testing initiated at 8 July 2019 14:28 by user thomas.