carlos
Intel Core i7-7700 testing with a FUJITSU D3402-B2 (V5.0.0.12 R1.8.0 for D3402-B2x BIOS) and Intel HD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
22012021
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
low
hihg
ultra
ultimate
800-low
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
1024-ultimate
1024_ulti
Processor: Intel Core i7-7700 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: FUJITSU D3402-B2 (V5.0.0.12 R1.8.0 for D3402-B2x BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 2 x 16384 MB DDR4-2400MT/s, Disk: 2 x 2000GB TOSHIBA DT01ACA2, Graphics: Intel HD 630 3GB (1150MHz), Audio: Realtek ALC671, Monitor: Acer X113 + 22P1W, Network: Intel I219-LM + 4 x Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.8.0-38-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.2.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1280x1024
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
22012021
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 January 2021 11:03 by user root.
low
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 January 2021 11:07 by user root.
hihg
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 January 2021 11:15 by user root.
ultra
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 January 2021 11:20 by user root.
ultimate
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 22 January 2021 11:29 by user root.
800-low
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 29 January 2021 10:32 by user root.
1024-ultimate
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 29 January 2021 10:35 by user root.
1024_ulti
Processor: Intel Core i7-7700 @ 4.20GHz (4 Cores / 8 Threads), Motherboard: FUJITSU D3402-B2 (V5.0.0.12 R1.8.0 for D3402-B2x BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 2 x 16384 MB DDR4-2400MT/s, Disk: 2 x 2000GB TOSHIBA DT01ACA2, Graphics: Intel HD 630 3GB (1150MHz), Audio: Realtek ALC671, Monitor: Acer X113 + 22P1W, Network: Intel I219-LM + 4 x Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.8.0-38-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.8, Display Driver: modesetting 1.20.8, OpenGL: 4.6 Mesa 20.2.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1280x1024
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 29 January 2021 10:52 by user root.