test
wsl testing on Ubuntu 20.04 via the Phoronix Test Suite.
gdf
Processor: Intel Core i9-9900K (8 Cores / 16 Threads), Memory: 16GB, Disk: 275GB Virtual Disk, Graphics: D3D12 8GB
OS: Ubuntu 20.04, Kernel: 5.10.60.1-microsoft-standard-WSL2 (x86_64), Display Server: X Server + Wayland, OpenGL: 3.3 Mesa 21.0.3, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x2160, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
GLmark2
This is a test of GLmark2, a basic OpenGL and OpenGL ES 2.0 benchmark supporting various windowing/display back-ends. Learn more via the OpenBenchmarking.org test page.
gdf
Processor: Intel Core i9-9900K (8 Cores / 16 Threads), Memory: 16GB, Disk: 275GB Virtual Disk, Graphics: D3D12 8GB
OS: Ubuntu 20.04, Kernel: 5.10.60.1-microsoft-standard-WSL2 (x86_64), Display Server: X Server + Wayland, OpenGL: 3.3 Mesa 21.0.3, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 3840x2160, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.8.10
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 11 October 2021 15:13 by user alliot.