phoronix-test-suite.build-linux-kernel
Intel Xeon E5-2650 v3 testing with a ASUS Z10PA-U8 (3801 BIOS) and ASPEED on CentOS Linux 8 via the Phoronix Test Suite.
Intel Xeon E5-2650 v3
Processor: Intel Xeon E5-2650 v3 @ 3.00GHz (10 Cores / 20 Threads), Motherboard: ASUS Z10PA-U8 (3801 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32768MB, Disk: 2 x 1000GB Western Digital WDS100T2B0A, Graphics: ASPEED, Network: 2 x Intel I210
OS: CentOS Linux 8, Kernel: 4.18.0-147.3.1.el8_1.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server, File-System: xfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x43
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration. Learn more via the OpenBenchmarking.org test page.
Intel Xeon E5-2650 v3
Processor: Intel Xeon E5-2650 v3 @ 3.00GHz (10 Cores / 20 Threads), Motherboard: ASUS Z10PA-U8 (3801 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32768MB, Disk: 2 x 1000GB Western Digital WDS100T2B0A, Graphics: ASPEED, Network: 2 x Intel I210
OS: CentOS Linux 8, Kernel: 4.18.0-147.3.1.el8_1.x86_64 (x86_64), Desktop: GNOME Shell 3.32.2, Display Server: X Server, File-System: xfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x43
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 1 February 2020 00:32 by user .