master_blender_bmw
docker testing on Ubuntu 20.04 via the Phoronix Test Suite.
Common KVM - llvmpipe - QEMU Standard PC (i440FX +
Processor: Common KVM (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 4096MB, Disk: 2 x 17GB QEMU HDD, Graphics: llvmpipe, Monitor: QEMU Monitor
OS: Ubuntu 20.04, Kernel: 5.15.0-40-generic (x86_64), Desktop: Xfce 4.14, Display Server: X Server, OpenGL: 4.5 Mesa 21.0.3 (LLVM 12.0.0 128 bits), File-System: nfs, Screen Resolution: 1620x795, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via NVIDIA OptiX and NVIDIA CUDA is currently supported and HIP for AMD Radeon GPUs. Learn more via the OpenBenchmarking.org test page.
Common KVM - llvmpipe - QEMU Standard PC (i440FX +
Processor: Common KVM (4 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org BIOS), Memory: 4096MB, Disk: 2 x 17GB QEMU HDD, Graphics: llvmpipe, Monitor: QEMU Monitor
OS: Ubuntu 20.04, Kernel: 5.15.0-40-generic (x86_64), Desktop: Xfce 4.14, Display Server: X Server, OpenGL: 4.5 Mesa 21.0.3 (LLVM 12.0.0 128 bits), File-System: nfs, Screen Resolution: 1620x795, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 29 June 2022 08:01 by user admin.