Benchmarks by Michael Larabel for a future article.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC1220, Monitor: ASUS MG28U, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-18-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
This test profile uses the Selenium WebDriver for running various browser benchmarks in different available web browsers. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 7 April 2020 14:36 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 7 April 2020 18:11 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 April 2020 06:47 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 April 2020 09:13 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 8 April 2020 18:00 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 9 April 2020 05:35 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 9 April 2020 08:53 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 9 April 2020 11:38 by user pts.
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 9 April 2020 16:39 by user pts.
Processor: Intel Core i9-9900KS @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (1302 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16GB, Disk: Samsung SSD 970 EVO 250GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC1220, Monitor: ASUS MG28U, Network: Intel I219-V
OS: Ubuntu 20.04, Kernel: 5.4.0-18-generic (x86_64), Desktop: GNOME Shell 3.36.0, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, OpenGL: 4.6 Mesa 20.0.2, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca
Python Notes: + Python 3.8.2
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Mitigation of TSX disabled
Testing initiated at 9 April 2020 18:41 by user pts.