benchmark-cg2400-pts-smallpt

2 x Intel Xeon E5-2658 v4 testing with a Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS) and Matrox MGA G200e [Pilot] on Rocky Linux 8.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409062-NE-BENCHMARK79
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x Intel Xeon E5-2658 v4
September 06
  3 Minutes


benchmark-cg2400-pts-smallptOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2658 v4 @ 2.30GHz (28 Cores / 56 Threads)Intel S2600CWR (SE5C610.86B.01.01.0016.033120161139 BIOS)Intel Xeon E7 v4/Xeon8 x 16 GB DDR4-2400MT/s Micron 18ASF2G72PDZ-2G3B11199GB RS3YCMatrox MGA G200e [Pilot]6 x Intel I350 + 4 x Intel X710 for 10GbE SFP+ + 2 x Intel X550 + 8 x Intel X550 Virtual FunctionRocky Linux 8.104.18.0-553.8.1.el8_10.x86_64 (x86_64)GCC 8.5.0 20210514xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionBenchmark-cg2400-pts-smallpt PerformanceSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000017- SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

Smallpt

Smallpt is a C++ global illumination renderer written in less than 100 lines of code. Global illumination is done via unbiased Monte Carlo path tracing and there is multi-threading support via the OpenMP library. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterSmallpt 1.0Global Illumination Renderer; 128 Samples2 x Intel Xeon E5-2658 v41020304050SE +/- 0.06, N = 342.23