no-mitigations
Spectre mitigations disabled
no-mitigations
Processor: Intel Core i7-8700K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z370 AORUS Gaming 7 (F6 BIOS), Chipset: Intel 8th Gen Core, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB + 240GB KINGSTON SA400S3 + 120GB KINGSTON SA400S3, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1284/1750MHz), Audio: Realtek ALC1220, Monitor: Acer X34 P + D27QO, Network: Intel I219-V + Qualcomm Atheros Killer E2500
OS: ManjaroLinux 20.2, Kernel: 5.9.3-1-MANJARO (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, OpenGL: 4.6 Mesa 20.2.1 (LLVM 10.0.1), Compiler: GCC 10.2.0 + Clang 10.0.1, File-System: ext4, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Vulnerable
OpenArena
This is a test of OpenArena, a popular open-source first-person shooter. This game is based upon ioquake3, which in turn uses the GPL version of id Software's Quake 3 engine. Learn more via the OpenBenchmarking.org test page.
no-mitigations
Processor: Intel Core i7-8700K @ 5.00GHz (6 Cores / 12 Threads), Motherboard: Gigabyte Z370 AORUS Gaming 7 (F6 BIOS), Chipset: Intel 8th Gen Core, Memory: 32GB, Disk: Samsung SSD 960 EVO 500GB + 240GB KINGSTON SA400S3 + 120GB KINGSTON SA400S3, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1284/1750MHz), Audio: Realtek ALC1220, Monitor: Acer X34 P + D27QO, Network: Intel I219-V + Qualcomm Atheros Killer E2500
OS: ManjaroLinux 20.2, Kernel: 5.9.3-1-MANJARO (x86_64), Desktop: KDE Frameworks 5.76.0, Display Server: X Server 1.20.9, Display Driver: modesetting 1.20.9, OpenGL: 4.6 Mesa 20.2.1 (LLVM 10.0.1), Compiler: GCC 10.2.0 + Clang 10.0.1, File-System: ext4, Screen Resolution: 4880x2560
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Graphics Notes: GLAMOR
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable + tsx_async_abort: Vulnerable
Testing initiated at 14 November 2020 17:23 by user montazar.