thrsh
atehyrjtursh
aethhty
Processor: 2 x Intel Xeon Platinum 8275CL (48 Cores / 96 Threads), Motherboard: Amazon EC2 c5d.24xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 186GB, Disk: 550GB Amazon Elastic Block Store + 4 x 900GB Amazon EC2 NVMe Instance Storage, Graphics: llvmpipe, Network: Amazon Elastic
OS: Ubuntu 20.04, Kernel: 5.4.0-1039-aws (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003005
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL, NVIDIA OptiX, and NVIDIA CUDA is supported. Learn more via the OpenBenchmarking.org test page.
aethhty
Processor: 2 x Intel Xeon Platinum 8275CL (48 Cores / 96 Threads), Motherboard: Amazon EC2 c5d.24xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 186GB, Disk: 550GB Amazon Elastic Block Store + 4 x 900GB Amazon EC2 NVMe Instance Storage, Graphics: llvmpipe, Network: Amazon Elastic
OS: Ubuntu 20.04, Kernel: 5.4.0-1039-aws (x86_64), Desktop: GNOME Shell 3.36.7, Display Server: X Server 1.20.9, Compiler: GCC 9.3.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003005
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 March 2021 20:36 by user ubuntu.