2 x Intel Xeon E5430 testing with a HP ProLiant DL360 G5 (P58 BIOS) and AMD ES1000 128MB on Gentoo/Linux via the Phoronix Test Suite.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: CentOS Linux 7, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: hpsa.hpsa_allow_any=1
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x60f
Security Notes: SELinux
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Arch Linux, Kernel: 5.5.2-zen1-1-zen (x86_64), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
OS: Debian 10, Kernel: 5.4.18-xanmod10 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
OS: Gentoo/Linux, Kernel: 4.19.97-gentoo-x86_64 (x86_64), Compiler: GCC 9.2.0 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0 --disable-altivec --disable-esp --disable-fixed-point --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/python --without-isl
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
This test times how long it takes to build the MPlayer media player program. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: CentOS Linux 7, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: hpsa.hpsa_allow_any=1
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x60f
Security Notes: SELinux
Testing initiated at 9 February 2020 14:34 by user kjawo.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 February 2020 17:25 by user kjawo.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Arch Linux, Kernel: 5.5.2-zen1-1-zen (x86_64), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 February 2020 17:46 by user kjawo.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 5.4.18-xanmod10 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 11 February 2020 17:32 by user kjawo.
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Gentoo/Linux, Kernel: 4.19.97-gentoo-x86_64 (x86_64), Compiler: GCC 9.2.0 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0 --disable-altivec --disable-esp --disable-fixed-point --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/python --without-isl
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 February 2020 19:20 by user kjawo.