Macbook Pro retina 2012 benchmark Gaming
Ubuntu 20.04 Kernel 5.4 Nvidia driver
Mojave Intel HD 4000
Processor: Intel Core i7 @ 2.30GHz (4 Cores / 8 Threads), Motherboard: Apple MacBook Pro, Chipset: Intel 7, Memory: 2 x 4 GB DDR3-1600MHz, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000 + NVIDIA GeForce GT 650M 2GB, Monitor: Color LCD
OS: macOS 10.14.4, Kernel: 18.5.0 (x86_64), Display Server: X Server 1.18.4, OpenGL: 2.1, Compiler: Apple LLVM 10.0.1 (clang-1001.0.46.4) + GCC 4.2.1 + Xcode 10.2.1, File-System: APFS, Screen Resolution: 2880x1800
Environment Notes: XPC_FLAGS=0x0
OpenMandriva 4.1 intel+nouveau
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Ubuntu 20.04 Kernel 5.4 Nvidia driver
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 390.138, OpenGL: 4.6.0, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Xonotic
This is a benchmark of Xonotic, which is a fork of the DarkPlaces-based Nexuiz game. Development began in March of 2010 on the Xonotic game. Learn more via the OpenBenchmarking.org test page.
Mojave Intel HD 4000
Processor: Intel Core i7 @ 2.30GHz (4 Cores / 8 Threads), Motherboard: Apple MacBook Pro, Chipset: Intel 7, Memory: 2 x 4 GB DDR3-1600MHz, Disk: 251GB APPLE SSD SM256E, Graphics: Intel HD 4000 + NVIDIA GeForce GT 650M 2GB, Monitor: Color LCD
OS: macOS 10.14.4, Kernel: 18.5.0 (x86_64), Display Server: X Server 1.18.4, OpenGL: 2.1, Compiler: Apple LLVM 10.0.1 (clang-1001.0.46.4) + GCC 4.2.1 + Xcode 10.2.1, File-System: APFS, Screen Resolution: 2880x1800
Environment Notes: XPC_FLAGS=0x0
Testing initiated at 4 May 2019 22:49 by user tux.
OpenMandriva 4.1 intel+nouveau
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA NVE7 1GB, Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom NetXtreme BCM57762 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: OpenMandrivaLinux 4.1, Kernel: 5.5.12-desktop-1omv4001 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.3 Mesa 20.0.7, Compiler: Clang 9.0.1 + GCC 9.2.1 20191207 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2880x1800
Kernel Notes: dm_mod.use_blk_mq=1
Environment Notes: AMD_DEBUG=nodcc
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 18 September 2020 14:28 by user tux.
Ubuntu 20.04 Kernel 5.4 Nvidia driver
Processor: Intel Core i7-3615QM @ 3.30GHz (4 Cores / 8 Threads), Motherboard: Apple Mac-C3EC7CD22292981F (259.0.0.0.0 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 251GB APPLE SSD SM256E, Graphics: NVIDIA GeForce GT 650M 1GB (797/2508MHz), Audio: Cirrus Logic CS4206, Monitor: Color LCD, Network: Broadcom NetXtreme BCM57786 PCIe + Broadcom BCM4331 802.11a/b/g/n
OS: Ubuntu 20.04, Kernel: 5.4.0-47-generic (x86_64), Desktop: MATE 1.24.0, Display Server: X Server 1.20.8, Display Driver: NVIDIA 390.138, OpenGL: 4.6.0, Compiler: GCC 9.3.0, File-System: zfs, Screen Resolution: 2880x1800
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 20 September 2020 12:15 by user tux.