wsl-java-gradle-perf

Intel Core i7-7700HQ testing with a Dell 05FFDN (1.18.0 BIOS) and Intel HD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2005206-NI-2005193NI76.

wsl-java-gradle-perfProcessorMemoryDiskMotherboardChipsetGraphicsAudioNetworkOSKernelCompilerFile-SystemSystem LayerDesktopDisplay ServerDisplay DriverOpenGLScreen ResolutionWindows 10 2004 19041.2640 WSLWindows 10 2004 19041.2640 WSL2Ubuntu 20.04 LTS Bare MetalIntel Core i7-7700HQ @ 2.81GHz (4 Cores / 8 Threads)16GB117GBUbuntu 20.044.4.0-19041-Microsoft (x86_64)GCC 9.3.0wslfswslIntel Core i7-7700HQ (4 Cores / 8 Threads)14GB2 x 275GB Virtual Disk4.19.84-microsoft-standard (x86_64)ext4microsoftIntel Core i7-7700HQ @ 3.80GHz (4 Cores / 8 Threads)Dell 05FFDN (1.18.0 BIOS)Intel Xeon E3-1200 v6/7th16GBTHNSN5512GPUK NVMe TOSHIBA 512GB + 64GB Flash Drive FITIntel HD 630 3GB (1100MHz)Realtek ALC3266Intel 8265 / 82755.4.0-31-generic (x86_64)GNOME Shell 3.36.1X Server 1.20.8modesetting 1.20.84.6 Mesa 20.0.43840x2160OpenBenchmarking.orgProcessor Details- Windows 10 2004 19041.2640 WSL: CPU Microcode: 0xffffffff- Windows 10 2004 19041.2640 WSL2: CPU Microcode: 0xffffffff- Ubuntu 20.04 LTS Bare Metal: Scaling Governor: intel_pstate performance - CPU Microcode: 0xcaJava Details- OpenJDK Runtime Environment (build 11.0.7+10-post-Ubuntu-3ubuntu1)Security Details- Windows 10 2004 19041.2640 WSL2: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected - Ubuntu 20.04 LTS Bare Metal: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected

wsl-java-gradle-perfjava-gradle-perf: ReactorDifferenceStandard ErrorStandard DeviationWindows 10 2004 19041.2640 WSLWindows 10 2004 19041.2640 WSL2Ubuntu 20.04 LTS Bare Metal260.9981.06x2.261.50%278.2671.00x2.601.62%275.1901.01x3.002.88%OpenBenchmarking.org

Java Gradle Build

Gradle Build: Reactor

OpenBenchmarking.orgSeconds, Fewer Is BetterJava Gradle BuildGradle Build: ReactorWindows 10 2004 19041.2640 WSLWindows 10 2004 19041.2640 WSL2Ubuntu 20.04 LTS Bare Metal60120180240300SE +/- 2.26, N = 3SE +/- 2.60, N = 3SE +/- 3.00, N = 7261.00278.27275.19


Phoronix Test Suite v10.8.4