EPYC 7551 Blender 2.90
AMD EPYC 7551 32-Core testing with a GIGABYTE MZ31-AR0-00 v01010101 (F10 BIOS) and ASPEED on Debian 10 via the Phoronix Test Suite.
r1
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8001227
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
r2
r3
Processor: AMD EPYC 7551 32-Core @ 2.00GHz (32 Cores / 64 Threads), Motherboard: GIGABYTE MZ31-AR0-00 v01010101 (F10 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB, Graphics: ASPEED, Network: Realtek RTL8111/8168/8411 + 2 x Broadcom NetXtreme II BCM57810 10
OS: Debian 10, Kernel: 4.19.0-10-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Blender
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL or CUDA is supported. Learn more via the OpenBenchmarking.org test page.
r1
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8001227
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 August 2020 17:23 by user root.
r2
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8001227
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 August 2020 18:46 by user root.
r3
Processor: AMD EPYC 7551 32-Core @ 2.00GHz (32 Cores / 64 Threads), Motherboard: GIGABYTE MZ31-AR0-00 v01010101 (F10 BIOS), Chipset: AMD 17h, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB, Graphics: ASPEED, Network: Realtek RTL8111/8168/8411 + 2 x Broadcom NetXtreme II BCM57810 10
OS: Debian 10, Kernel: 4.19.0-10-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8001227
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 August 2020 19:39 by user root.