hdd
2 x Intel Xeon E5-2620 v4 testing with a EVOC SVE-2901VD2N (5.11 BIOS) and ASPEED on CentOS Linux 7 via the Phoronix Test Suite.
2 x Intel Xeon E5-2620 v4 - ASPEED - EVOC
Processor: 2 x Intel Xeon E5-2620 v4 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: EVOC SVE-2901VD2N (5.11 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 4 x 32 GB DDR4-2667MT/s HMA84GR7CJR4N-VK, Disk: 12001GB MR9361-8i, Graphics: ASPEED, Monitor: Philips 190V, Network: 2 x Intel I350
OS: CentOS Linux 7, Kernel: 3.10.0-1127.18.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1440x900
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xb00002a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Threaded I/O Tester
Tiotester (Threaded I/O Tester) benchmarks the hard disk drive / file-system performance. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon E5-2620 v4 - ASPEED - EVOC
Processor: 2 x Intel Xeon E5-2620 v4 @ 3.00GHz (16 Cores / 32 Threads), Motherboard: EVOC SVE-2901VD2N (5.11 BIOS), Chipset: Intel Xeon E7 v4/Xeon, Memory: 4 x 32 GB DDR4-2667MT/s HMA84GR7CJR4N-VK, Disk: 12001GB MR9361-8i, Graphics: ASPEED, Monitor: Philips 190V, Network: 2 x Intel I350
OS: CentOS Linux 7, Kernel: 3.10.0-1127.18.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: xfs, Screen Resolution: 1440x900
Disk Notes: DEADLINE / attr2,inode64,noquota,relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xb00002a
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 10 August 2020 04:27 by user root.