Oracle VirtualBox testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel Core i7-10870H (8 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 107GB VBOX HDD, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 6.8.1 (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server + Wayland, OpenGL: 4.1 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game for this open-source first person shooter title. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-10870H (8 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 107GB VBOX HDD, Graphics: SVGA3D; build: RELEASE; LLVM;, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 6.8.1 (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server + Wayland, OpenGL: 4.1 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1280x800, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + reg_file_data_sampling: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 14 May 2024 18:22 by user larianj.