kernelcompare
Intel Core i5-2520M testing with a HP 1618 (68SCF Ver. F.04 BIOS) and Intel HD 3000 2GB on ManjaroLinux 20.2 via the Phoronix Test Suite.
5.7.4_mitigation_off
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
5.7.4_mitigation_on
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 20.0.3, Kernel: 5.7.4-xanmod1-1-xanmod (x86_64), Desktop: Cinnamon 4.6.3, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.0.7, Compiler: GCC 10.1.0, File-System: ext4, Screen Resolution: 1366x768
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
5.9.8_mitigation_on
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
5.9.8_mitigation_off
OS: ManjaroLinux 20.2, Kernel: 5.9.8-xanmod1-1 (x86_64), Desktop: Cinnamon 4.6.7, Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.2.1, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1366x768
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
OpenArena
IPC_benchmark
IPC_benchmark is a Linux inter-process communication benchmark. Learn more via the OpenBenchmarking.org test page.
Unreal Tournament 2004 Demo
This test calculates the average frame-rate within the Unreal Tournament 2004 game demo from Epic Games. Learn more via the OpenBenchmarking.org test page.
Core-Latency
This is a test of core-latency, which measures the latency between all core combinations on the system processor(s). Reported is the average latency. Learn more via the OpenBenchmarking.org test page.
Unreal Tournament 2004 Demo
This test calculates the average frame-rate within the Unreal Tournament 2004 game demo from Epic Games. Learn more via the OpenBenchmarking.org test page.
Coremark
This is a test of EEMBC CoreMark processor benchmark. Learn more via the OpenBenchmarking.org test page.
IPC_benchmark
IPC_benchmark is a Linux inter-process communication benchmark. Learn more via the OpenBenchmarking.org test page.
5.7.4_mitigation_off
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 02:16 by user lobster.
5.7.4_mitigation_on
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 20.0.3, Kernel: 5.7.4-xanmod1-1-xanmod (x86_64), Desktop: Cinnamon 4.6.3, Display Server: X Server 1.20.8, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.0.7, Compiler: GCC 10.1.0, File-System: ext4, Screen Resolution: 1366x768
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 03:48 by user lobster.
5.9.8_mitigation_on
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 06:43 by user lobster.
5.9.8_mitigation_off
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 20.2, Kernel: 5.9.8-xanmod1-1 (x86_64), Desktop: Cinnamon 4.6.7, Display Server: X Server 1.20.9, Display Driver: intel 2.99.917, OpenGL: 3.3 Mesa 20.2.1, Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1366x768
Environment Notes: mesa_glthread=true
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 12 November 2020 07:23 by user lobster.