Oracle VMware testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: Intel Core i5-10210U (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 4096MB, Disk: 43GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 5.15.0-43-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server, OpenGL: 4.5 Mesa 22.0.5 (LLVM 13.0.1 256 bits), Vulkan: 1.2.204, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x918, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.10.12
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT Host state unknown + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
This test profile uses the open-source speedtest-cli client to benchmark your Internet connection's upload/download performance and latency against the Speedtest.net servers. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-10210U (2 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 4096MB, Disk: 43GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 22.04, Kernel: 5.15.0-43-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server, OpenGL: 4.5 Mesa 22.0.5 (LLVM 13.0.1 256 bits), Vulkan: 1.2.204, Compiler: GCC 11.4.0, File-System: ext4, Screen Resolution: 1920x918, System Layer: Oracle VMware
Kernel Notes: Transparent Huge Pages: madvise
Python Notes: Python 3.10.12
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT Host state unknown + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 17 October 2024 09:34 by user root.