1st run
wsl testing on Ubuntu 20.04 via the Phoronix Test Suite.
i7-7700-work
Processor: Intel Core i7-7700 (4 Cores / 8 Threads), Memory: 26GB, Disk: 5 x 275GB Virtual Disk, Graphics: NVIDIA GeForce GTX 1050 Ti
OS: Ubuntu 20.04, Kernel: 5.4.72-microsoft-standard-WSL2 (x86_64), Display Server: X Server, Compiler: GCC 9.3.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Java Notes: OpenJDK Runtime Environment (build 11.0.11+9-Ubuntu-0ubuntu2.20.04)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Java Gradle Build
This test runs Java software project builds using the Gradle build system. It is intended to give developers an idea as to the build performance for development activities and build servers. Learn more via the OpenBenchmarking.org test page.
i7-7700-work
Processor: Intel Core i7-7700 (4 Cores / 8 Threads), Memory: 26GB, Disk: 5 x 275GB Virtual Disk, Graphics: NVIDIA GeForce GTX 1050 Ti
OS: Ubuntu 20.04, Kernel: 5.4.72-microsoft-standard-WSL2 (x86_64), Display Server: X Server, Compiler: GCC 9.3.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Java Notes: OpenJDK Runtime Environment (build 11.0.11+9-Ubuntu-0ubuntu2.20.04)
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 21 August 2021 11:10 by user matzon.