Intel Core i5-10600K testing with a ASUS PRIME Z490M-PLUS (1001 BIOS) and ASUS Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i5-10600K @ 4.80GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME Z490M-PLUS (1001 BIOS), Chipset: Intel Comet Lake PCH, Memory: 32GB, Disk: Samsung SSD 970 EVO 500GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: LG Ultra HD, Network: Intel
OS: Ubuntu 20.04, Kernel: 5.9.0-050900daily20201012-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.0.8, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x2160
Blender is an open-source 3D creation and modeling software project. This test is of Blender's Cycles benchmark with various sample files. GPU computing via OpenCL, NVIDIA OptiX, and NVIDIA CUDA is supported. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2021 15:17 by user phoronix.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2021 17:35 by user phoronix.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 25 February 2021 20:30 by user phoronix.
Processor: Intel Core i5-10600K @ 4.80GHz (6 Cores / 12 Threads), Motherboard: ASUS PRIME Z490M-PLUS (1001 BIOS), Chipset: Intel Comet Lake PCH, Memory: 32GB, Disk: Samsung SSD 970 EVO 500GB, Graphics: ASUS Intel UHD 630 3GB (1200MHz), Audio: Realtek ALC887-VD, Monitor: LG Ultra HD, Network: Intel
OS: Ubuntu 20.04, Kernel: 5.9.0-050900daily20201012-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, OpenGL: 4.6 Mesa 20.0.8, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xe0
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 February 2021 06:25 by user phoronix.