e5-2699v4-dual-blender-BMW27-benchmark-2024-03-26

2 x Intel Xeon E5-2699 v4 testing with a Supermicro X10DRL-i v1.01 (2.0_NIC BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2403261-NE-E52699V4D86.

e5-2699v4-dual-blender-BMW27-benchmark-2024-03-26ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDisplay ServerVulkanCompilerFile-SystemScreen Resolution2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro2 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads)Supermicro X10DRL-i v1.01 (2.0_NIC BIOS)Intel Xeon E7 v4/Xeon128GB128GB SAMSUNG SSD SM84ASPEED2 x Intel I210Ubuntu 20.045.15.0-101-generic (x86_64)X Server 1.20.131.1.182GCC 9.4.0ext41024x768OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

e5-2699v4-dual-blender-BMW27-benchmark-2024-03-26blender: BMW27 - CPU-OnlyStandard ErrorStandard Deviation2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro51.830.130.43%OpenBenchmarking.org

Blender

Blend File: BMW27 - Compute: CPU-Only

OpenBenchmarking.orgSeconds, Fewer Is BetterBlender 4.0Blend File: BMW27 - Compute: CPU-Only2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro1224364860SE +/- 0.13, N = 351.83


Phoronix Test Suite v10.8.4