mateus
microsoft testing on Ubuntu 20.04 via the Phoronix Test Suite.
first_run
Processor: Intel Core i7-7700HQ (4 Cores / 8 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk, Graphics: NVIDIA GeForce GTX 1050 Ti
OS: Ubuntu 20.04, Kernel: 4.19.104-microsoft-standard (x86_64), Compiler: GCC 9.3.0 + Clang 10.0.0-4ubuntu1 + LLVM 10.0.0, File-System: ext4, System Layer: microsoft
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
first_run
Processor: Intel Core i7-7700HQ (4 Cores / 8 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk, Graphics: NVIDIA GeForce GTX 1050 Ti
OS: Ubuntu 20.04, Kernel: 4.19.104-microsoft-standard (x86_64), Compiler: GCC 9.3.0 + Clang 10.0.0-4ubuntu1 + LLVM 10.0.0, File-System: ext4, System Layer: microsoft
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 26 August 2020 15:19 by user mateus.