Ubuntu 19.10 Performance
Various open-source benchmarks by the Phoronix Test Suite v9.2.1 (Hurdal).
2020-02-15 20:42
Processor: Intel Core i7-4790K (4 Cores / 8 Threads), Motherboard: Microsoft Virtual Machine v7.0 (090007 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8192MB, Disk: 136GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 19.10, Kernel: 5.3.0-7625-generic (x86_64), Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
2020-02-15 20:42
Processor: Intel Core i7-4790K (4 Cores / 8 Threads), Motherboard: Microsoft Virtual Machine v7.0 (090007 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 8192MB, Disk: 136GB Virtual Disk, Graphics: Microsoft Hyper-V virtual VGA
OS: Ubuntu 19.10, Kernel: 5.3.0-7625-generic (x86_64), Desktop: GNOME Shell 3.34.3, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, Compiler: GCC 9.2.1 20191008, File-System: ext4, Screen Resolution: 1152x864, System Layer: Microsoft Hyper-V Server
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 15 February 2020 20:42 by user bnguyen.