dual-e5-2696v4-z10ped16-vray-benchmark-2024-04-23

2 x Intel Xeon E5-2696 v4 testing with a ASUS Z10PE-D16 (3801 BIOS) and ASPEED on Ubuntu 22.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2404231-NE-DUALE526958.

dual-e5-2696v4-z10ped16-vray-benchmark-2024-04-23ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDisplay ServerVulkanCompilerFile-SystemScreen Resolution2 x Intel Xeon E5-2696 v4 - ASPEED - ASUS Z10PE-D162 x Intel Xeon E5-2696 v4 @ 3.70GHz (44 Cores / 88 Threads)ASUS Z10PE-D16 (3801 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-2133MT/s500GB SHGP31-500GMASPEEDULTRON 2435V2 x Intel I350Ubuntu 22.045.15.105-0515105-generic (x86_64)X Server 1.21.1.41.3.255GCC 11.4.0ext41920x1080OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000036- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

dual-e5-2696v4-z10ped16-vray-benchmark-2024-04-23v-ray: CPUStandard ErrorStandard Deviation2 x Intel Xeon E5-2696 v4 - ASPEED - ASUS Z10PE-D1638843407.562.35%OpenBenchmarking.org

Chaos Group V-RAY

Mode: CPU

OpenBenchmarking.orgvsamples, More Is BetterChaos Group V-RAY 6.0Mode: CPU2 x Intel Xeon E5-2696 v4 - ASPEED - ASUS Z10PE-D168K16K24K32K40KSE +/- 407.56, N = 538843


Phoronix Test Suite v10.8.4