xeon-w-cpu
Intel Xeon W-2123 testing with a Dell 06JWJY (2.0.2 BIOS) and NVIDIA Quadro P2000 5GB on openSUSE Leap 15.2 via the Phoronix Test Suite.
Intel Xeon W-2123
Processor: Intel Xeon W-2123 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 06JWJY (2.0.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 500GB Samsung SSD 860, Graphics: NVIDIA Quadro P2000 5GB, Audio: Realtek ALC3234, Monitor: S242HL, Network: Intel I219-LM
OS: openSUSE Leap 15.2, Kernel: 5.3.18-lp152.57-default (x86_64), Desktop: GNOME Shell 3.34.5, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1080
Environment Notes: LIBGL_DEBUG=quiet
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Smallpt
Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.
Intel Xeon W-2123
Processor: Intel Xeon W-2123 @ 3.90GHz (4 Cores / 8 Threads), Motherboard: Dell 06JWJY (2.0.2 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 126GB, Disk: 500GB Samsung SSD 860, Graphics: NVIDIA Quadro P2000 5GB, Audio: Realtek ALC3234, Monitor: S242HL, Network: Intel I219-LM
OS: openSUSE Leap 15.2, Kernel: 5.3.18-lp152.57-default (x86_64), Desktop: GNOME Shell 3.34.5, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, Compiler: GCC 7.5.0, File-System: btrfs, Screen Resolution: 1920x1080
Environment Notes: LIBGL_DEBUG=quiet
Compiler Notes: --build=x86_64-suse-linux --disable-libcc1 --disable-libssp --disable-libstdcxx-pch --disable-libvtv --disable-plugin --disable-werror --enable-checking=release --enable-gnu-indirect-function --enable-languages=c,c++,objc,fortran,obj-c++,ada,go --enable-libstdcxx-allocator=new --enable-linux-futex --enable-multilib --enable-offload-targets=hsa,nvptx-none, --enable-ssp --enable-version-specific-runtime-libs --host=x86_64-suse-linux --mandir=/usr/share/man --with-arch-32=x86-64 --with-gcc-major-version-only --with-slibdir=/lib64 --with-tune=generic --without-cuda-driver --without-system-libunwind
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x2006906
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 1 January 2021 17:58 by user .