resultfile

Intel Xeon E5-2676 v3 testing with a INTEL X99 (5.11 BIOS) and ASUS AMD Radeon RX 5600 XT 6GB on Fedora Linux 41 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2412224-NE-RESULTFIL53&gru&sor.

resultfileProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLFile-SystemScreen Resolutionstandard core voltageIntel Xeon E5-2676 v3Intel Xeon E5-2676 v3 - ASUS AMD Radeon RX 5600 XTIntel Xeon E5-2676 v3 -50mV offsetIntel Xeon E5-2676 v3 @ 3.00GHz (12 Cores / 24 Threads)INTEL X99 (5.11 BIOS)Intel Xeon E7 v3/Xeon32GB480GB Patriot Burst El + 240GB SanDisk SDSSDA24 + 1000GB Seagate ST1000LM024 HN-M + 240GB KINGSTON SA400S3ASUS AMD Radeon RX 5600 XT 6GBRealtek ALC662 rev1P225HQLRealtek RTL8111/8168/8211/8411Fedora Linux 416.11.10-300.fc41.x86_64 (x86_64)GNOME Shell 47.1Wayland4.6 Mesa 24.2.8 (LLVM 19.1.0 DRM 3.59)btrfs1920x10806.12.5-200.fc41.x86_64 (x86_64)GNOME Shell 47.2OpenBenchmarking.orgKernel Details- Transparent Huge Pages: madviseProcessor Details- standard core voltage: Scaling Governor: intel_cpufreq conservative - CPU Microcode: 0x49- Intel Xeon E5-2676 v3: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49- Intel Xeon E5-2676 v3 - ASUS AMD Radeon RX 5600 XT: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49- Intel Xeon E5-2676 v3 -50mV offset: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49Security Details- standard core voltage: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected - Intel Xeon E5-2676 v3: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected - Intel Xeon E5-2676 v3 - ASUS AMD Radeon RX 5600 XT: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected - Intel Xeon E5-2676 v3 -50mV offset: SELinux + gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

resultfileavifenc: 6, Losslessblender: BMW27 - CPU-Onlystandard core voltageIntel Xeon E5-2676 v3Intel Xeon E5-2676 v3 - ASUS AMD Radeon RX 5600 XTIntel Xeon E5-2676 v3 -50mV offset18.206224.2618.082OpenBenchmarking.org

libavif avifenc

Encoder Speed: 6, Lossless

OpenBenchmarking.orgSeconds, Fewer Is Betterlibavif avifenc 1.0Encoder Speed: 6, LosslessIntel Xeon E5-2676 v3 -50mV offsetIntel Xeon E5-2676 v348121620SE +/- 0.03, N = 3SE +/- 0.09, N = 318.0818.211. (CXX) g++ options: -O3 -fPIC -lm

Blender

Blend File: BMW27 - Compute: CPU-Only

OpenBenchmarking.orgSeconds, Fewer Is BetterBlender 4.3Blend File: BMW27 - Compute: CPU-OnlyIntel Xeon E5-2676 v3 - ASUS AMD Radeon RX 5600 XT50100150200250SE +/- 12.04, N = 2224.26


Phoronix Test Suite v10.8.5