w480_blender
Intel Xeon W-1270 testing with a ASUS W480/SYS (0204 BIOS) and EFI VGA on Ubuntu 19.04 via the Phoronix Test Suite.
w480_blender
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
w1270blender
w1270_bmw_CPU
Processor: Intel Xeon W-1270 @ 4.90GHz (8 Cores / 16 Threads), Motherboard: ASUS W480/SYS (0204 BIOS), Chipset: Intel Device 06ef, Memory: 4 x 16384 MB DDR4-3200MT/s Micron 16ATF2G64AZ-3G2E1, Disk: 240GB CT240BX500SSD1, Graphics: EFI VGA, Audio: Realtek ALC887-VD, Network: Intel Device 0d4c + Intel Device 15f2 + Marvell 88E8053 PCI-E
OS: Ubuntu 19.04, Kernel: 5.0.0-38-generic (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Blender
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL or CUDA is supported. Learn more via the OpenBenchmarking.org test page.
w480_blender
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 March 2020 05:25 by user root.
w1270blender
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 March 2020 06:11 by user root.
w1270_bmw_CPU
Processor: Intel Xeon W-1270 @ 4.90GHz (8 Cores / 16 Threads), Motherboard: ASUS W480/SYS (0204 BIOS), Chipset: Intel Device 06ef, Memory: 4 x 16384 MB DDR4-3200MT/s Micron 16ATF2G64AZ-3G2E1, Disk: 240GB CT240BX500SSD1, Graphics: EFI VGA, Audio: Realtek ALC887-VD, Network: Intel Device 0d4c + Intel Device 15f2 + Marvell 88E8053 PCI-E
OS: Ubuntu 19.04, Kernel: 5.0.0-38-generic (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc4
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 10 March 2020 06:53 by user root.