wsl testing on Ubuntu 20.04 via the Phoronix Test Suite.
Processor: Intel Core i3-10110U (2 Cores / 4 Threads), Memory: 4096MB, Disk: 0GB Virtual Disk + Virtual Disk + 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: X Server + Wayland, Vulkan: 1.1.182, Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1920x1080, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Optcarrot is an NES emulator benchmark for the Ruby language. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i3-10110U (2 Cores / 4 Threads), Memory: 4096MB, Disk: 0GB Virtual Disk + Virtual Disk + 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: X Server + Wayland, Vulkan: 1.1.182, Compiler: GCC 9.4.0 + Clang 10.0.0-4ubuntu1, File-System: ext4, Screen Resolution: 1920x1080, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Unknown: Dependent on hypervisor status + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 18 August 2024 06:06 by user tanec.