native-vs-default
Intel Core i5-2520M testing with a HP 1618 (68SCF Ver. F.04 BIOS) and Intel HD 3000 2GB on ManjaroLinux 21.0 via the Phoronix Test Suite.
default
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 21.0, Kernel: 5.11.10-xanmod1-cacule-1-cacule (x86_64), Desktop: Cinnamon 4.8.6, Display Server: X Server 1.20.10, OpenGL: 3.3 Mesa 20.3.4, Compiler: GCC 10.2.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: mesa_glthread=true
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
native
OS: ManjaroLinux 21.0, Kernel: 5.11.10-xanmod1-cacule-1-cacule (x86_64), Desktop: Cinnamon 4.8.6, Display Server: X Server 1.20.10, OpenGL: 3.3 Mesa 21.1.0-devel (git-57511d1458), Vulkan: 1.0.168, Compiler: GCC 10.2.0 + Clang 11.1.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1366x768
SuperTuxKart
This is a test of SuperTuxKart, an open-source racing game. The engine, Antarctica, is a highly modified version of Irrlicht and uses OpenGL 3.1+. Bullet is used for physics. Sound is provided by OpenAL. Learn more via the OpenBenchmarking.org test page.
OpenArena
default
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 21.0, Kernel: 5.11.10-xanmod1-cacule-1-cacule (x86_64), Desktop: Cinnamon 4.8.6, Display Server: X Server 1.20.10, OpenGL: 3.3 Mesa 20.3.4, Compiler: GCC 10.2.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: mesa_glthread=true
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 April 2021 12:57 by user lobster.
native
Processor: Intel Core i5-2520M @ 3.20GHz (2 Cores / 4 Threads), Motherboard: HP 1618 (68SCF Ver. F.04 BIOS), Chipset: Intel 2nd Generation Core DRAM, Memory: 8GB, Disk: 320GB Seagate ST9320423AS, Graphics: Intel HD 3000 2GB (1300MHz), Audio: IDT 92HD81B1X5, Network: Intel 82579LM + Intel Centrino Advanced-N 6205
OS: ManjaroLinux 21.0, Kernel: 5.11.10-xanmod1-cacule-1-cacule (x86_64), Desktop: Cinnamon 4.8.6, Display Server: X Server 1.20.10, OpenGL: 3.3 Mesa 21.1.0-devel (git-57511d1458), Vulkan: 1.0.168, Compiler: GCC 10.2.0 + Clang 11.1.0 + LLVM 11.1.0, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: mesa_glthread=true
Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2f
Graphics Notes: SNA
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 April 2021 16:54 by user lobster.