20220911compilekerneldefconfig
Intel Core i7-5820K testing with a ASRock X99 Extreme6/ac (P1.70 BIOS) and MSI NVIDIA GeForce GTX 1070 8GB on Gentoo/Linux via the Phoronix Test Suite.
2022_09_11_compile_kernel_defconfig
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x29
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
20220911compilekerneldefconfig
Processor: Intel Core i7-5820K @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASRock X99 Extreme6/ac (P1.70 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 256GB Crucial CT256MX1 + 500GB SAMSUNG HD501LJ + 80GB SAMSUNG SP0812C + 8002GB Seagate ST8000AS0002-1NA, Graphics: MSI NVIDIA GeForce GTX 1070 8GB, Audio: Creative Labs CA0108/CA10300, Network: Intel I218-V + Qualcomm Atheros QCA8171 + Intel 7260
OS: Gentoo/Linux, Kernel: 5.15.19-gentoo-x86_64 (x86_64), Display Server: X Server 1.21.1.3, Display Driver: NVIDIA 470.103.01, Compiler: GCC 11.3.0, File-System: xfs
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x29
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Timed Linux Kernel Compilation
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Timed ImageMagick Compilation
This test times how long it takes to build ImageMagick. Learn more via the OpenBenchmarking.org test page.
2022_09_11_compile_kernel_defconfig
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x29
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 September 2022 20:17 by user torsten.
20220911compilekerneldefconfig
Processor: Intel Core i7-5820K @ 3.60GHz (6 Cores / 12 Threads), Motherboard: ASRock X99 Extreme6/ac (P1.70 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 256GB Crucial CT256MX1 + 500GB SAMSUNG HD501LJ + 80GB SAMSUNG SP0812C + 8002GB Seagate ST8000AS0002-1NA, Graphics: MSI NVIDIA GeForce GTX 1070 8GB, Audio: Creative Labs CA0108/CA10300, Network: Intel I218-V + Qualcomm Atheros QCA8171 + Intel 7260
OS: Gentoo/Linux, Kernel: 5.15.19-gentoo-x86_64 (x86_64), Display Server: X Server 1.21.1.3, Display Driver: NVIDIA 470.103.01, Compiler: GCC 11.3.0, File-System: xfs
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x29
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 September 2022 20:34 by user torsten.