BASELINEQ9550

Intel Core 2 Quad Q9550 testing with a ASUS P5QL PRO (1004 BIOS) and ASUS AMD Radeon HD 7870 GHz Edition 2GB on Fedora 32 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2009201-AS-BASELINEQ92
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel Core 2 Quad Q9550
September 20 2020
  3 Minutes


BASELINEQ9550OpenBenchmarking.orgPhoronix Test SuiteIntel Core 2 Quad Q9550 @ 2.83GHz (4 Cores)ASUS P5QL PRO (1004 BIOS)Intel 4 DRAM + ICH108192MB80GB Western Digital WD800JD-75MSASUS AMD Radeon HD 7870 GHz Edition 2GBRealtek ALC1200Acer XF240HQualcomm Atheros AR8121/AR8113/AR8114Fedora 325.8.9-200.fc32.x86_64 (x86_64)GNOME Shell 3.36.6X Server + Wayland4.5 Mesa 20.1.7 (LLVM 10.0.1)GCC 10.2.1 20200723 + Clang 10.0.0btrfs1920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionBASELINEQ9550 BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - Scaling Governor: acpi-cpufreq ondemand- SELinux + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishIntel Core 2 Quad Q95507001400210028003500SE +/- 38.71, N = 53239