Intel Core i9-9900KS testing with a ASUS PRIME Z390-A (1302 BIOS) and ASUS Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC1220, Monitor: ASUS MG28U, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-18-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
OpenVKL is the Intel Open Volume Kernel Library that offers high-performance volume computation kernels and part of the Intel oneAPI rendering toolkit. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC1220, Monitor: ASUS MG28U, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-18-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 April 2020 05:44 by user pts.