beachy-results-09-23
Intel Core 2 Quad Q6600 testing with a EVGA 122-CK-NF68 and XFX AMD Radeon HD 6950 2GB on Ubuntu 20.04 via the Phoronix Test Suite.
1
Processor: Intel Core 2 Quad Q6600 (4 Cores), Motherboard: EVGA 122-CK-NF68, Chipset: NVIDIA C55, Memory: 8GB, Disk: 256GB SAMSUNG SSD PM81, Graphics: XFX AMD Radeon HD 6950 2GB, Audio: Realtek ALC889A, Monitor: LG FULL HD, Network: Qualcomm Atheros AR922X
OS: Ubuntu 20.04, Kernel: 5.11.0-36-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xba
Graphics Notes: GLAMOR
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
GLmark2
This is a test of GLmark2, a basic OpenGL and OpenGL ES 2.0 benchmark supporting various windowing/display back-ends. Learn more via the OpenBenchmarking.org test page.
1
Processor: Intel Core 2 Quad Q6600 (4 Cores), Motherboard: EVGA 122-CK-NF68, Chipset: NVIDIA C55, Memory: 8GB, Disk: 256GB SAMSUNG SSD PM81, Graphics: XFX AMD Radeon HD 6950 2GB, Audio: Realtek ALC889A, Monitor: LG FULL HD, Network: Qualcomm Atheros AR922X
OS: Ubuntu 20.04, Kernel: 5.11.0-36-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.11, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xba
Graphics Notes: GLAMOR
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 September 2021 19:30 by user guest.