wsl testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 7900 12-Core (11 Cores / 22 Threads), Memory: 50GB, Disk: 0GB Virtual Disk + 14GB Virtual Disk + 1100GB Virtual Disk, Graphics: Microsoft Basic Render Driver 12GB
OS: Ubuntu 22.04, Kernel: 5.15.133.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, Compiler: GCC 11.4.0 + CUDA 11.5, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 7900 12-Core (11 Cores / 22 Threads), Memory: 50GB, Disk: 0GB Virtual Disk + 14GB Virtual Disk + 1100GB Virtual Disk, Graphics: Microsoft Basic Render Driver 12GB
OS: Ubuntu 22.04, Kernel: 5.15.133.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, Compiler: GCC 11.4.0 + CUDA 11.5, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 June 2024 22:04 by user chhar0.