Intel Xeon W-2295 Benchmarks
Various open-source benchmarks by the Phoronix Test Suite v10.4.0 (Ibestad).
Intel Xeon W-2295
Processor: Intel Xeon W-2295 @ 4.60GHz (18 Cores / 36 Threads), Motherboard: ASUS WS C422 PRO_SE (3701 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 504GB, Disk: 2 x 2000GB Samsung SSD 970 EVO Plus 2TB, Graphics: llvmpipe, Audio: Realtek ALC1220, Monitor: S24C650, Network: 2 x Intel I210
OS: openSUSE Leap 15.4, Kernel: 5.14.21-150400.24.55-default (x86_64), Desktop: KDE Plasma 5.24.4, Display Server: X Server 1.20.3, OpenGL: 4.5 Mesa 21.2.4 (LLVM 11.0.1 256 bits), Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003303
Python Notes: Python 3.9.13
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Intel Xeon W-2295
Processor: Intel Xeon W-2295 @ 4.60GHz (18 Cores / 36 Threads), Motherboard: ASUS WS C422 PRO_SE (3701 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 504GB, Disk: 2 x 2000GB Samsung SSD 970 EVO Plus 2TB, Graphics: llvmpipe, Audio: Realtek ALC1220, Monitor: S24C650, Network: 2 x Intel I210
OS: openSUSE Leap 15.4, Kernel: 5.14.21-150400.24.55-default (x86_64), Desktop: KDE Plasma 5.24.4, Display Server: X Server 1.20.3, OpenGL: 4.5 Mesa 21.2.4 (LLVM 11.0.1 256 bits), Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1200
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x5003303
Python Notes: Python 3.9.13
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 14 April 2023 23:07 by user benutzer.