Intel Xeon E3-1275 v6 testing with a ASUS P10S-M WS (4401 BIOS) and Intel HD P630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Xeon E3-1275 v6 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS P10S-M WS (4401 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: Samsung SSD 970 EVO Plus 500GB, Graphics: Intel HD P630 3GB (1150MHz), Audio: Realtek ALC1150, Monitor: DELL S2409W, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.4, Compiler: GCC 9.2.1 20191130, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
PyPerformance is the reference Python performance benchmark suite. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Xeon E3-1275 v6 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: ASUS P10S-M WS (4401 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 16384MB, Disk: Samsung SSD 970 EVO Plus 500GB, Graphics: Intel HD P630 3GB (1150MHz), Audio: Realtek ALC1150, Monitor: DELL S2409W, Network: 2 x Intel I210
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.5 Mesa 19.2.4, Compiler: GCC 9.2.1 20191130, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable
Testing initiated at 11 January 2020 12:04 by user phoronix.