E31270
Intel Xeon E31270 testing with a Supermicro X9SCL/X9SCM v1.11 (1.1a BIOS) and Matrox MGA G200eW WPCM450 on Debian testing via the Phoronix Test Suite.
E31270
Processor: Intel Xeon E31270 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCL/X9SCM v1.11 (1.1a BIOS), Chipset: Intel Xeon E3-1200 DRAM, Memory: 4 x GB DDR3-1333MT/s HMT351U7BFR8C-H9, Disk: 4 x 6001GB Western Digital WD6001FZWX-0 + 128GB Samsung SSD 850 + 12 x 18000GB Seagate ST18000NM000J-2T + 3 x 500GB Seagate ST3500320AS + 2 x 1000GB Hitachi HDS72101 + 1000GB MAXTOR STM310003 + 500GB SAMSUNG HD501LJ + 1000GB SAMSUNG HD103UJ + 500GB Western Digital WD5000KS-00M, Graphics: Matrox MGA G200eW WPCM450, Network: Intel 82579LM + Intel 82574L
OS: Debian testing, Kernel: 5.9.0-5-amd64 (x86_64), Compiler: GCC 10.2.1 20210110, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x1b
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Cryptsetup
This is a test profile for running the cryptsetup benchmark to report on the system's cryptography performance. Learn more via the OpenBenchmarking.org test page.
E31270
Processor: Intel Xeon E31270 @ 3.80GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCL/X9SCM v1.11 (1.1a BIOS), Chipset: Intel Xeon E3-1200 DRAM, Memory: 4 x GB DDR3-1333MT/s HMT351U7BFR8C-H9, Disk: 4 x 6001GB Western Digital WD6001FZWX-0 + 128GB Samsung SSD 850 + 12 x 18000GB Seagate ST18000NM000J-2T + 3 x 500GB Seagate ST3500320AS + 2 x 1000GB Hitachi HDS72101 + 1000GB MAXTOR STM310003 + 500GB SAMSUNG HD501LJ + 1000GB SAMSUNG HD103UJ + 500GB Western Digital WD5000KS-00M, Graphics: Matrox MGA G200eW WPCM450, Network: Intel 82579LM + Intel 82574L
OS: Debian testing, Kernel: 5.9.0-5-amd64 (x86_64), Compiler: GCC 10.2.1 20210110, File-System: xfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x1b
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 April 2021 12:07 by user root.