wsl testing on Ubuntu 24.04 via the Phoronix Test Suite.
Processor: Intel N100 (4 Cores), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk
OS: Ubuntu 24.04, Kernel: 5.15.167.4-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.1 Mesa 24.0.9-0ubuntu0.3, Compiler: GCC 13.3.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.12.3
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: BHI_DIS_S + srbds: Not affected + tsx_async_abort: Not affected
Processor: Intel N100 (4 Cores), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 8GB
This is a test to obtain the general Numpy performance. Learn more via the OpenBenchmarking.org test page.
run01: The test run did not produce a result. The test run did not produce a result. The test run did not produce a result.
Processor: Intel N100 (4 Cores), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk
OS: Ubuntu 24.04, Kernel: 5.15.167.4-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.1 Mesa 24.0.9-0ubuntu0.3, Compiler: GCC 13.3.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.12.3
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: BHI_DIS_S + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 January 2025 05:17 by user sek_20066.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.12.3
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: BHI_DIS_S + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 January 2025 03:24 by user sek_20066.
Processor: Intel N100 (4 Cores), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 8GB
OS: Ubuntu 24.04, Kernel: 5.15.167.4-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.1 Mesa 24.0.9-0ubuntu0.3, Compiler: GCC 13.3.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Python Notes: Python 3.12.3
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; RSB filling; PBRSB-eIBRS: SW sequence; BHI: BHI_DIS_S + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 31 January 2025 03:27 by user sek_20066.