Intel Core i5-2520M testing with a HP 1618 (68SCF Ver. F.04 BIOS) and Intel HD 3000 2GB on ManjaroLinux 20.0.3 via the Phoronix Test Suite.
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 20.0.3, Kernel: 5.7.4-xanmod1-1-xanmod (x86_64), Desktop: Cinnamon 4.6.3, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.0.7, Compiler: GCC 10.1.0, File-System: ext4, Screen Resolution: 1366x768
This is a test of core-latency, which measures the latency between all core combinations on the system processor(s). Reported is the average latency. Learn more via the OpenBenchmarking.org test page.
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
IPC_benchmark is a Linux inter-process communication benchmark. Learn more via the OpenBenchmarking.org test page.
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
This test calculates the average frame-rate within the Unreal Tournament 2004 game demo from Epic Games. Learn more via the OpenBenchmarking.org test page.
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 June 2020 09:07 by user lobster.
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 June 2020 09:26 by user lobster.
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 20.0.3, Kernel: 5.7.4-xanmod1-1-xanmod (x86_64), Desktop: Cinnamon 4.6.3, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.0.7, Compiler: GCC 10.1.0, File-System: ext4, Screen Resolution: 1366x768
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 June 2020 10:13 by user lobster.