1

Intel Xeon E5-2680 v4 testing with a Intel X99 (5.11 BIOS) and AMD Radeon RX 580 2048SP 8GB on Ubuntu 22.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2401124-NE-13296305071.

1ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionAMD Radeon RX 580 2048SPIntel Xeon E5-2680 v4 @ 3.30GHz (14 Cores / 28 Threads)Intel X99 (5.11 BIOS)Intel Xeon E7 v4/Xeon32GBJAZER P3500 512GB NVMe M.2 + WALRAM 512GBAMD Radeon RX 580 2048SP 8GB (1286/1750MHz)Realtek ALC887-VDKA272 ARealtek RTL8111/8168/8411Ubuntu 22.046.2.0-37-generic (x86_64)GNOME Shell 42.9X Server 1.21.1.44.6 Mesa 23.2.0-devel (LLVM 16.0.6 DRM 3.54)GCC 11.4.0ext41920x1080OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0xb000040- BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: xxx-xxx-xxx- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

1glmark2: 1920 x 1080AMD Radeon RX 580 2048SP5143OpenBenchmarking.org

GLmark2

Resolution: 1920 x 1080

OpenBenchmarking.orgScore, More Is BetterGLmark2Resolution: 1920 x 1080AMD Radeon RX 580 2048SP110022003300440055005143


Phoronix Test Suite v10.8.4