warsow-test
qemu testing on Ubuntu 18.04 via the Phoronix Test Suite.
NVIDIA Quadro K1200
Processor: Common KVM (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 12GB, Disk: 311GB QEMU HDD, Graphics: NVIDIA Quadro K1200 4GB, Audio: Intel 82801I, Monitor: LEN T24i-10, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.4.0-74-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.8, Display Driver: NVIDIA 460.80, Vulkan: 1.2.155, Compiler: GCC 7.5.0 + Clang 5.0.1-4 + CUDA 10.2, File-System: ext4, Screen Resolution: 1600x900, System Layer: qemu
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Warsow
This is a benchmark of Warsow, a popular open-source first-person shooter. This game uses the QFusion engine. Learn more via the OpenBenchmarking.org test page.
NVIDIA Quadro K1200
Processor: Common KVM (8 Cores), Motherboard: QEMU Standard PC (Q35 + ICH9 2009) (0.0.0 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 12GB, Disk: 311GB QEMU HDD, Graphics: NVIDIA Quadro K1200 4GB, Audio: Intel 82801I, Monitor: LEN T24i-10, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.4.0-74-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.8, Display Driver: NVIDIA 460.80, Vulkan: 1.2.155, Compiler: GCC 7.5.0 + Clang 5.0.1-4 + CUDA 10.2, File-System: ext4, Screen Resolution: 1600x900, System Layer: qemu
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 9 June 2021 09:57 by user swen.