OpenJDK 20
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 1.8.0_41-b04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 9+181)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment 18.3 (build 10+46)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment 18.9 (build 11+28)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 12+33)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 13+33)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 14+36-1461)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 15+36-1562)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 16+36-2231)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 17+35-2724)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 18+36-2087)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 19-ea+29-2143)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel Core i7-12700H (12 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8GB, Disk: 107GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 20.04, Kernel: 5.13.0-30-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, File-System: ext4, Screen Resolution: 800x600, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 20-ea+4-158)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
This test runs the Java version of SciMark 2.0, which is a benchmark for scientific and numerical computing developed by programmers at the National Institute of Standards and Technology. This benchmark is made up of Fast Foruier Transform, Jacobi Successive Over-relaxation, Monte Carlo, Sparse Matrix Multiply, and dense LU matrix factorization benchmarks. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 1.8.0_41-b04)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 21:42 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 9+181)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 21:49 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment 18.3 (build 10+46)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 21:54 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment 18.9 (build 11+28)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 21:59 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 12+33)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:12 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 13+33)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:16 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 14+36-1461)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:20 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 15+36-1562)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:24 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 16+36-2231)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:28 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 17+35-2724)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:32 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 18+36-2087)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:38 by user turing.
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 19-ea+29-2143)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:46 by user turing.
Processor: Intel Core i7-12700H (12 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8GB, Disk: 107GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 20.04, Kernel: 5.13.0-30-generic (x86_64), Desktop: GNOME Shell 3.36.9, Display Server: X Server 1.20.13, File-System: ext4, Screen Resolution: 800x600, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x413
Java Notes: OpenJDK Runtime Environment (build 20-ea+4-158)
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2022 22:57 by user turing.