firsttest

Intel Xeon W-2123 testing with a HP 81C5 (P61 v02.40 BIOS) and NVIDIA Quadro P2000 on Fedora 30 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2011047-FI-FIRSTTEST96
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel Xeon W-2123
November 04 2020
  4 Minutes


firsttestOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon W-2123 @ 3.90GHz (4 Cores / 8 Threads)HP 81C5 (P61 v02.40 BIOS)Intel Sky Lake-E DMI3 Registers16GB512GB SAMSUNG MZVLW512HMJP-000H1 + 3001GB Seagate ST3000DM008-2DM1NVIDIA Quadro P2000Realtek ALC221DELL U2717DIntel I219-LM + Intel I210Fedora 305.6.13-100.fc30.x86_64 (x86_64)Cinnamon 4.4.8X Server 1.20.6modesetting 1.20.6GCC 9.3.1 20200408 + Clang 8.0.0ext42560x1440ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverCompilerFile-SystemScreen ResolutionFirsttest BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2000065- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5Intel Xeon W-2123130K260K390K520K650KSE +/- 1813.14, N = 36264151. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2