dual-epyc-7551-blender-BMW27-benchmark-2024-04-07
2 x AMD EPYC 7551 32-Core testing with a Supermicro H11DSi-NT v2.00 (2.8 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
2 x AMD EPYC 7551 32-Core - ASPEED - Supermicro
Processor: 2 x AMD EPYC 7551 32-Core @ 2.00GHz (64 Cores / 128 Threads), Motherboard: Supermicro H11DSi-NT v2.00 (2.8 BIOS), Chipset: AMD 17h, Memory: 256GB, Disk: 128GB SAMSUNG SSD SM84, Graphics: ASPEED, Network: 2 x Mellanox MT27500
OS: Ubuntu 20.04, Kernel: 5.15.0-101-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x800126e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender
2 x AMD EPYC 7551 32-Core - ASPEED - Supermicro
Processor: 2 x AMD EPYC 7551 32-Core @ 2.00GHz (64 Cores / 128 Threads), Motherboard: Supermicro H11DSi-NT v2.00 (2.8 BIOS), Chipset: AMD 17h, Memory: 256GB, Disk: 128GB SAMSUNG SSD SM84, Graphics: ASPEED, Network: 2 x Mellanox MT27500
OS: Ubuntu 20.04, Kernel: 5.15.0-101-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, Vulkan: 1.1.182, Compiler: GCC 9.4.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0x800126e
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT vulnerable + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 April 2024 15:29 by user skinguru.