blendertest
blender test 01-05-2023
blendertest-01-05-2023
Processor: Intel Xeon E5-2670 v3 @ 3.10GHz (12 Cores / 24 Threads), Motherboard: MACHINIST E5-RS9 (5.11 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 2 x 8 GB DDR4-2133MT/s, Disk: 2000GB Western Digital WD20EZRX-00D, Audio: Realtek ALC897, Network: Realtek RTL8111/8168/8411
OS: Debian GNU/Linux 11, Kernel: 5.15.102-1-pve (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x3d
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Blender
Blender is an open-source 3D creation software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing is supported. This system/blender test profile makes use of the system-supplied Blender. Use pts/blender if wishing to stick to a fixed version of Blender. Learn more via the OpenBenchmarking.org test page.
blendertest-01-05-2023
Processor: Intel Xeon E5-2670 v3 @ 3.10GHz (12 Cores / 24 Threads), Motherboard: MACHINIST E5-RS9 (5.11 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 2 x 8 GB DDR4-2133MT/s, Disk: 2000GB Western Digital WD20EZRX-00D, Audio: Realtek ALC897, Network: Realtek RTL8111/8168/8411
OS: Debian GNU/Linux 11, Kernel: 5.15.102-1-pve (x86_64), Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x3d
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 1 May 2023 17:21 by user root.