4k nvidia xonotic
Intel Core i9-10980XE testing with a ASRock X299 Steel Legend (P1.30 BIOS) and NVIDIA GeForce GTX 1080 Ti 11GB on Ubuntu 22.04 via the Phoronix Test Suite.
A
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003302
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 86.02.39.00.01
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
B
C
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: Samsung SSD 970 PRO 512GB, Graphics: NVIDIA GeForce GTX 1080 Ti 11GB, Audio: Realtek ALC1220, Monitor: ASUS VP28U, Network: Intel I219-V + Intel I211
OS: Ubuntu 22.04, Kernel: 5.15.0-39-generic (x86_64), Desktop: GNOME Shell 40.5, Display Server: X Server 1.20.13, Display Driver: NVIDIA 510.73.05, OpenGL: 4.6.0, OpenCL: OpenCL 3.0 CUDA 11.6.134, Vulkan: 1.2.204, Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 3840x2160
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
A
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003302
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 86.02.39.00.01
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 2 July 2022 06:14 by user pts.
B
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003302
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 86.02.39.00.01
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 2 July 2022 06:37 by user pts.
C
Processor: Intel Core i9-10980XE @ 4.80GHz (18 Cores / 36 Threads), Motherboard: ASRock X299 Steel Legend (P1.30 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 32GB, Disk: Samsung SSD 970 PRO 512GB, Graphics: NVIDIA GeForce GTX 1080 Ti 11GB, Audio: Realtek ALC1220, Monitor: ASUS VP28U, Network: Intel I219-V + Intel I211
OS: Ubuntu 22.04, Kernel: 5.15.0-39-generic (x86_64), Desktop: GNOME Shell 40.5, Display Server: X Server 1.20.13, Display Driver: NVIDIA 510.73.05, OpenGL: 4.6.0, OpenCL: OpenCL 3.0 CUDA 11.6.134, Vulkan: 1.2.204, Compiler: GCC 11.2.0, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x5003302
Graphics Notes: BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 86.02.39.00.01
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 2 July 2022 07:12 by user pts.