9900k980ti
Intel Core i9-9900K testing with a Gigabyte Z390 AORUS MASTER-CF (F6 BIOS) and eVGA NVIDIA GeForce GTX 980 Ti 6GB on Gentoo/Linux via the Phoronix Test Suite.
9900k_980ti_1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9c
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
9900k_980ti_unigine_1
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Gigabyte Z390 AORUS MASTER-CF (F6 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: 1024GB Samsung SSD 960 PRO 1TB + 512GB Samsung SSD 840 + 1000GB Samsung SSD 840, Graphics: eVGA NVIDIA GeForce GTX 980 Ti 6GB (1189/3505MHz), Audio: Realtek ALC1220, Monitor: ROG PG278Q, Network: Intel I219-V + Intel-AC 9560
OS: Gentoo/Linux, Kernel: 5.9.2-gentoo (x86_64), Desktop: KDE Plasma 5.20.2, Display Server: X Server 1.20.8, Display Driver: NVIDIA 455.38, OpenGL: 4.6.0, Vulkan: 1.2.142, Compiler: GCC 10.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2560x1440
Unigine Heaven
This test calculates the average frame-rate within the Heaven demo for the Unigine engine. This engine is extremely demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Sanctuary
This test calculates the average frame-rate within the Sanctuary demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
Unigine Tropics
This test calculates the average frame-rate within the Tropics / Islands demo for the Unigine engine. This engine is very demanding on the system's graphics card. Learn more via the OpenBenchmarking.org test page.
9900k_980ti_1
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9c
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 November 2020 14:18 by user cfrye.
9900k_980ti_unigine_1
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: Gigabyte Z390 AORUS MASTER-CF (F6 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 32GB, Disk: 1024GB Samsung SSD 960 PRO 1TB + 512GB Samsung SSD 840 + 1000GB Samsung SSD 840, Graphics: eVGA NVIDIA GeForce GTX 980 Ti 6GB (1189/3505MHz), Audio: Realtek ALC1220, Monitor: ROG PG278Q, Network: Intel I219-V + Intel-AC 9560
OS: Gentoo/Linux, Kernel: 5.9.2-gentoo (x86_64), Desktop: KDE Plasma 5.20.2, Display Server: X Server 1.20.8, Display Driver: NVIDIA 455.38, OpenGL: 4.6.0, Vulkan: 1.2.142, Compiler: GCC 10.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 2560x1440
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x9c
Security Notes: itlb_multihit: vulnerable + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 November 2020 15:36 by user cfrye.