blender bmw27

2 x Intel Xeon E5-2699 v4 testing with a Supermicro X10DRL-i v1.01 (3.4 BIOS) and ASPEED on Ubuntu 22.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2402189-NE-BLENDERBM73.

blender bmw27ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen Resolution2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro2 x Intel Xeon E5-2699 v4 @ 3.60GHz (44 Cores / 88 Threads)Supermicro X10DRL-i v1.01 (3.4 BIOS)Intel Xeon E7 v4/Xeon112GB1920GB INTEL SSDSC2KG01ASPEEDULTRON 2435V2 x Intel I210Ubuntu 22.046.5.0-18-generic (x86_64)GNOME Shell 42.9X Server 1.21.1.4GCC 11.4.0ext41600x1200OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0xb000040- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

blender bmw27blender: BMW27 - CPU-OnlyStandard ErrorStandard Deviation2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro52.890.431.42%OpenBenchmarking.org

Blender

Blend File: BMW27 - Compute: CPU-Only

OpenBenchmarking.orgSeconds, Fewer Is BetterBlender 4.0Blend File: BMW27 - Compute: CPU-Only2 x Intel Xeon E5-2699 v4 - ASPEED - Supermicro1224364860SE +/- 0.43, N = 352.89


Phoronix Test Suite v10.8.5