Intel Xeon W3690 testing with a Dell Precision WorkStation T3500 09KPNV (A11 BIOS) and NVIDIA Quadro P1000 4GB on VoidPup64 22.02 via the Phoronix Test Suite.
Processor: Intel Xeon W3690 (6 Cores), Motherboard: Dell Precision WorkStation T3500 09KPNV (A11 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 3 x 4 GB DDR3-1333MT/s HMT351U7BFR8A-H9, Disk: 500GB Samsung SSD 850, Graphics: NVIDIA Quadro P1000 4GB, Audio: Analog Devices AD1984A, Monitor: DELL U2422H, Network: Broadcom NetXtreme BCM5761 PCIe
OS: VoidPup64 22.02, Kernel: 6.6.63 (x86_64), Display Server: X Server 1.21.1.14, Compiler: GCC 13.2.0, File-System: aufs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-unknown-linux-gnu --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-sjlj-exceptions --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x10
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This test times how long it takes to build the Linux kernel in a default configuration (defconfig) for the architecture being tested or alternatively an allmodconfig for building all possible kernel modules for the build. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon W3690 (6 Cores), Motherboard: Dell Precision WorkStation T3500 09KPNV (A11 BIOS), Chipset: Intel 5520/5500/X58 + ICH10R, Memory: 3 x 4 GB DDR3-1333MT/s HMT351U7BFR8A-H9, Disk: 500GB Samsung SSD 850, Graphics: NVIDIA Quadro P1000 4GB, Audio: Analog Devices AD1984A, Monitor: DELL U2422H, Network: Broadcom NetXtreme BCM5761 PCIe
OS: VoidPup64 22.02, Kernel: 6.6.63 (x86_64), Display Server: X Server 1.21.1.14, Compiler: GCC 13.2.0, File-System: aufs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-unknown-linux-gnu --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-sjlj-exceptions --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: CPU Microcode: 0x10
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 December 2024 20:19 by user .