Intel Core 2 Quad Q9550 testing with a Gigabyte G33M-S2L (F3K BIOS) and Gigabyte Intel 82G33/G31 IGP on Linuxmint 20.2 via the Phoronix Test Suite.
Processor: Intel Core 2 Quad Q9550 @ 2.83GHz (4 Cores), Motherboard: Gigabyte G33M-S2L (F3K BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 4 x 2048 MB 800MT/s, Disk: Transcend 32GB, Graphics: Gigabyte Intel 82G33/G31 IGP, Audio: Realtek ALC662 rev1, Network: Realtek RTL8111/8168/8411
OS: Linuxmint 20.2, Kernel: 5.4.0-74-generic (x86_64), Display Server: X Server 1.20.11, Compiler: GCC 9.3.0, File-System: overlayfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
This is a test of asmFish, an advanced chess benchmark written in Assembly. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core 2 Quad Q9550 @ 2.83GHz (4 Cores), Motherboard: Gigabyte G33M-S2L (F3K BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 4 x 2048 MB 800MT/s, Disk: Transcend 32GB, Graphics: Gigabyte Intel 82G33/G31 IGP, Audio: Realtek ALC662 rev1, Network: Realtek RTL8111/8168/8411
OS: Linuxmint 20.2, Kernel: 5.4.0-74-generic (x86_64), Display Server: X Server 1.20.11, Compiler: GCC 9.3.0, File-System: overlayfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0xa0b
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 August 2022 22:56 by user root.