Oracle VirtualBox testing on Ubuntu 22.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Processor: Intel Core i5-10210U (3 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 3584MB, Disk: 64GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 5.15.0-53-generic (x86_64), Desktop: GNOME Shell 42.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.0.5 (LLVM 13.0.1 256 bits), Vulkan: 1.2.204, Compiler: GCC 11.3.0, File-System: ext4, Screen Resolution: 1920x1080, System Layer: Oracle VirtualBox
This test uses systemd-analyze to report the kernel boot time. Learn more via the OpenBenchmarking.org test page.
Intel Core i5-10210U: The test run did not produce a result.
This is a wrapper around the phoronix-test-suite debug-self-test sub-command for testing hot Phoronix Test Suite code paths and if wanting to compare different PHP implementations. Learn more via the OpenBenchmarking.org test page.
Test: Refresh Graphs
2022-11-29 05:33: The test run did not produce a result. The test run did not produce a result.
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 29 November 2022 05:33 by user root.
Processor: Intel Core i5-10210U (3 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 3584MB, Disk: 64GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 5.15.0-53-generic (x86_64), Desktop: GNOME Shell 42.2, Display Server: X Server + Wayland, OpenGL: 4.5 Mesa 22.0.5 (LLVM 13.0.1 256 bits), Vulkan: 1.2.204, Compiler: GCC 11.3.0, File-System: ext4, Screen Resolution: 1920x1080, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: madvise
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT Host state unknown + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 29 November 2022 05:33 by user root.