compile
2 x Intel Xeon E5430 testing with a HP ProLiant DL360 G5 (P58 BIOS) and AMD ES1000 128MB on Gentoo/Linux via the Phoronix Test Suite.
CentOS 7
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: CentOS Linux 7, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: hpsa.hpsa_allow_any=1
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x60f
Security Notes: SELinux
Debian
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Arch
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Arch Linux, Kernel: 5.5.2-zen1-1-zen (x86_64), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Debian xanmod
OS: Debian 10, Kernel: 5.4.18-xanmod10 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Gentoo
OS: Gentoo/Linux, Kernel: 4.19.97-gentoo-x86_64 (x86_64), Compiler: GCC 9.2.0 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0 --disable-altivec --disable-esp --disable-fixed-point --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/python --without-isl
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Timed ImageMagick Compilation
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
Timed MPlayer Compilation
This test times how long it takes to build the MPlayer media player program. Learn more via the OpenBenchmarking.org test page.
CentOS 7
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: CentOS Linux 7, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: hpsa.hpsa_allow_any=1
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: CPU Microcode: 0x60f
Security Notes: SELinux
Testing initiated at 9 February 2020 14:34 by user kjawo.
Debian
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 February 2020 17:25 by user kjawo.
Arch
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Arch Linux, Kernel: 5.5.2-zen1-1-zen (x86_64), Compiler: GCC 9.2.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 February 2020 17:46 by user kjawo.
Debian xanmod
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Debian 10, Kernel: 5.4.18-xanmod10 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 11 February 2020 17:32 by user kjawo.
Gentoo
Processor: 2 x Intel Xeon E5430 (8 Cores), Motherboard: HP ProLiant DL360 G5 (P58 BIOS), Chipset: Intel 5000P MCH, Memory: 12288MB, Disk: 440GB LOGICAL VOLUME, Graphics: AMD ES1000 128MB, Monitor: SyncMaster, Network: 2 x Broadcom NetXtreme II BCM5708
OS: Gentoo/Linux, Kernel: 4.19.97-gentoo-x86_64 (x86_64), Compiler: GCC 9.2.0 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1024x768
Compiler Notes: --bindir=/usr/x86_64-pc-linux-gnu/gcc-bin/9.2.0 --build=x86_64-pc-linux-gnu --datadir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0 --disable-altivec --disable-esp --disable-fixed-point --disable-libmudflap --disable-libssp --disable-systemtap --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-languages=c,c++,fortran --enable-libgomp --enable-libstdcxx-time --enable-lto --enable-multilib --enable-nls --enable-obsolete --enable-secureplt --enable-shared --enable-targets=all --enable-threads=posix --enable-vtable-verify --host=x86_64-pc-linux-gnu --includedir=/usr/lib/gcc/x86_64-pc-linux-gnu/9.2.0/include --mandir=/usr/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/man --with-multilib-list=m32,m64 --with-python-dir=/share/gcc-data/x86_64-pc-linux-gnu/9.2.0/python --without-isl
Processor Notes: CPU Microcode: 0x60f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 18 February 2020 19:20 by user kjawo.