Intel Core i5-9400F testing with a MSI B360M GAMING PLUS (MS-7B19) v1.0 (1.10 BIOS) and MSI NVIDIA NV106 1GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Core i5-9400F @ 4.10GHz (6 Cores), Motherboard: MSI B360M GAMING PLUS (MS-7B19) v1.0 (1.10 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: 256GB SAMSUNG MZVPW256HEGL-000H7, Graphics: MSI NVIDIA NV106 1GB, Audio: Realtek ALC887-VD, Monitor: G237HL, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.3 Mesa 19.2.4, Compiler: GCC 9.2.1 20191130, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
PyPerformance is the reference Python performance benchmark suite. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-9400F @ 4.10GHz (6 Cores), Motherboard: MSI B360M GAMING PLUS (MS-7B19) v1.0 (1.10 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: 256GB SAMSUNG MZVPW256HEGL-000H7, Graphics: MSI NVIDIA NV106 1GB, Audio: Realtek ALC887-VD, Monitor: G237HL, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-9-generic (x86_64), Desktop: GNOME Shell 3.34.1, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 4.3 Mesa 19.2.4, Compiler: GCC 9.2.1 20191130, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: Python 2.7.17 + Python 3.7.6
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable SMT disabled + mds: Vulnerable; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected
Testing initiated at 11 January 2020 16:27 by user phoronix.