core_i9_darktable_phoronix.txt
Intel Core i9-9900K testing on Gentoo/Linux via the Phoronix Test Suite_Axel_b
core_i9_Axel_20200415a
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Chipset: Intel Cannon Lake PCH, Memory: 4 x 8192 MB DDR4-3333MT/s Kingston KHX3333C16D4, Disk: 1024GB Samsung SSD 970 PRO 1TB + 1000GB Samsung SSD 850 + 5001GB Seagate ST5000AS0011-1L5 + 32GB SSDSA2SH032G1GN, Graphics: Gigabyte NVIDIA GeForce GTX 1060 6GB (139/405MHz), Audio: Realtek ALC1220, Monitor: CS270, Network: Intel I219-V + 2 x Intel 82576
OS: Gentoo/Linux, Kernel: 5.6.3-gentoo (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.82, Vulkan: 1.1.119, Compiler: Clang 9.0.1 + LLVM 9.0.1 + CUDA 10.2, File-System: xfs, Screen Resolution: 4480x1440
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa0
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
core_i9_Axel_20200415b
Changed Graphics to Gigabyte NVIDIA GeForce GTX 1060 6GB (797/810MHz).
Darktable
Darktable is an open-source photography / workflow application this will use any system-installed Darktable program or on Windows will automatically download the pre-built binary from the project. Learn more via the OpenBenchmarking.org test page.
core_i9_Axel_20200415a
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Chipset: Intel Cannon Lake PCH, Memory: 4 x 8192 MB DDR4-3333MT/s Kingston KHX3333C16D4, Disk: 1024GB Samsung SSD 970 PRO 1TB + 1000GB Samsung SSD 850 + 5001GB Seagate ST5000AS0011-1L5 + 32GB SSDSA2SH032G1GN, Graphics: Gigabyte NVIDIA GeForce GTX 1060 6GB (139/405MHz), Audio: Realtek ALC1220, Monitor: CS270, Network: Intel I219-V + 2 x Intel 82576
OS: Gentoo/Linux, Kernel: 5.6.3-gentoo (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.82, Vulkan: 1.1.119, Compiler: Clang 9.0.1 + LLVM 9.0.1 + CUDA 10.2, File-System: xfs, Screen Resolution: 4480x1440
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa0
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 15 April 2020 19:16 by user root.
core_i9_Axel_20200415b
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Chipset: Intel Cannon Lake PCH, Memory: 4 x 8192 MB DDR4-3333MT/s Kingston KHX3333C16D4, Disk: 1024GB Samsung SSD 970 PRO 1TB + 1000GB Samsung SSD 850 + 5001GB Seagate ST5000AS0011-1L5 + 32GB SSDSA2SH032G1GN, Graphics: Gigabyte NVIDIA GeForce GTX 1060 6GB (797/810MHz), Audio: Realtek ALC1220, Monitor: CS270, Network: Intel I219-V + 2 x Intel 82576
OS: Gentoo/Linux, Kernel: 5.6.3-gentoo (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.7, Display Driver: NVIDIA 440.82, Vulkan: 1.1.119, Compiler: Clang 9.0.1 + LLVM 9.0.1 + CUDA 10.2, File-System: xfs, Screen Resolution: 4480x1440
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xa0
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 15 April 2020 19:27 by user root.