Intel Core 2 Quad Q9550 testing with a ASUS P5Q (1306 BIOS) and Sapphire AMD Radeon HD 6870 1GB on Ubuntu 19.04 via the Phoronix Test Suite.
Processor: Intel Core 2 Quad Q9550 (4 Cores), Motherboard: ASUS P5Q (1306 BIOS), Chipset: Intel 4 DRAM + ICH10R, Memory: 4096MB, Disk: 480GB SanDisk SSD PLUS, Graphics: Sapphire AMD Radeon HD 6870 1GB, Audio: Realtek ALC1200, Monitor: SyncMaster, Network: Qualcomm Atheros AR8121/AR8113/AR8114
OS: Ubuntu 19.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core 2 Quad Q9550 (4 Cores), Motherboard: ASUS P5Q (1306 BIOS), Chipset: Intel 4 DRAM + ICH10R, Memory: 4096MB, Disk: 480GB SanDisk SSD PLUS, Graphics: Sapphire AMD Radeon HD 6870 1GB, Audio: Realtek ALC1200, Monitor: SyncMaster, Network: Qualcomm Atheros AR8121/AR8113/AR8114
OS: Ubuntu 19.04, Kernel: 5.0.0-27-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 3.3 Mesa 19.0.8 (LLVM 8.0.0), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768
Graphics Notes: GLAMOR
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 8 September 2019 17:13 by user rso.