Intel Core i9-9900KS testing with a ASUS PRIME Z390-A (1302 BIOS) and ASUS Intel UHD 630 on Ubuntu 19.10 via the Phoronix Test Suite.
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 (1200MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V
OS: Ubuntu 19.10, Kernel: 5.5.0-999-generic (x86_64) 20191223, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, OpenGL: 4.6 Mesa 20.0.0-devel (git-4e3a09d 2020-01-09 eoan-oibaf-ppa), Vulkan: 1.1.129, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.5
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Mitigation of TSX disabled
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 (1200MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V
OS: Ubuntu 19.10, Kernel: 5.5.0-999-generic (x86_64) 20191223, Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, OpenGL: 4.6 Mesa 20.0.0-devel (git-4e3a09d 2020-01-09 eoan-oibaf-ppa), Vulkan: 1.1.129, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.5
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 10 January 2020 10:42 by user pts.