archlinux blender

2 x Intel testing with a Supermicro X10DAX v1.02 (3.0a BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on RebornOS rolling via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2012054-FI-ARCHLINUX73.

archlinux blenderProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen Resolution2 x Intel - Sapphire AMD Radeon RX2 x Intel @ 3.20GHz (16 Cores / 32 Threads)Supermicro X10DAX v1.02 (3.0a BIOS)Intel Xeon E7 v3/Xeon64GB1000GB KINGSTON SA2000M81000GSapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1340/2000MHz)Realtek ALC888-VDB22W-7 LED2 x Intel I210RebornOS rolling5.9.11-arch2-1 (x86_64)KDE Plasma 5.20.4X Server 1.20.10modesetting 1.20.104.6 Mesa 20.2.3 (LLVM 11.0.0)GCC 10.2.0 + Clang 11.0.0Target:btrfs1680x1050OpenBenchmarking.org- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x14- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

archlinux blenderblender: BMW27 - CPU-OnlyStandard ErrorStandard Deviation2 x Intel - Sapphire AMD Radeon RX132.060.030.04%OpenBenchmarking.org

Blender

Blend File: BMW27 - Compute: CPU-Only

OpenBenchmarking.orgSeconds, Fewer Is BetterBlender 2.91.0 date: time: commit commit hash: platform: type: c c++ link system:Blend File: BMW27 - Compute: CPU-Only2 x Intel - Sapphire AMD Radeon RX306090120150SE +/- 0.03, N = 3132.06


Phoronix Test Suite v10.8.4