test.txt
KVM testing on Debian 10 via the Phoronix Test Suite.
GOLD2
Processor: Intel Xeon Gold 6136 (2 Cores), Motherboard: UpCloud Cloud Server (rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 79GB, Graphics: bochsdrmfb, Network: 3 x Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
GOLD2
Processor: Intel Xeon Gold 6136 (2 Cores), Motherboard: UpCloud Cloud Server (rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 79GB, Graphics: bochsdrmfb, Network: 3 x Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-8-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 17 June 2020 23:58 by user root.