khiuioioi

2 x Intel Xeon E5-2682 v4 testing with a Supermicro X10DRL-i v1.01 (3.4 BIOS) and MSI AMD Radeon RX 6800 XT on Ubuntu 22.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2209130-NE-KHIUIOIOI26.

khiuioioiProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen Resolutionjkhlkh2 x Intel Xeon E5-2682 v4 @ 3.00GHz (32 Cores / 64 Threads)Supermicro X10DRL-i v1.01 (3.4 BIOS)Intel Xeon E7 v4/Xeon512GB8 x 500GB Samsung SSD 860MSI AMD Radeon RX 6800 XTAMD Navi 21 HDMI Audio2 x Intel I210 + Intel 7265Ubuntu 22.045.19.0-76051900-generic (x86_64)GNOME Shell 42.3.1X Server 1.21.1.34.6 Mesa 22.0.5 (LLVM 13.0.1 DRM 3.47)GCC 11.2.0ext43440x1440OpenBenchmarking.org- Transparent Huge Pages: madvise- RADV_PERFTEST=rt- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040- GLAMOR - BAR1 / Visible vRAM Size: 256 MB - vBIOS Version: 113-V395TRIO-2OC- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

khiuioioigeexlab-rt: 800 x 600jkhlkh5.4OpenBenchmarking.org

GeeXLab Vulkan Ray-Tracing Demo

Resolution: 800 x 600

OpenBenchmarking.orgFPS, More Is BetterGeeXLab Vulkan Ray-Tracing Demo 2021.2.18.0Resolution: 800 x 600jkhlkh1.2152.433.6454.866.075SE +/- 0.00, N = 35.4


Phoronix Test Suite v10.8.4