Intel Core i7-6700HQ On Ubuntu 20.04
Various open-source benchmarks by the Phoronix Test Suite v9.8.0 (Nesodden).
2020-08-13 22:17
Processor: Intel Core i7-6700HQ (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 4096MB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Desktop: GNOME Shell 3.36.3, Display Server: X Server 1.20.8, Display Driver: vmware 13.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x975, System Layer: Oracle VMware
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
2020-08-13 22:17
Processor: Intel Core i7-6700HQ (1 Core), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 4096MB, Disk: 21GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Ubuntu 20.04, Kernel: 5.4.0-42-generic (x86_64), Desktop: GNOME Shell 3.36.3, Display Server: X Server 1.20.8, Display Driver: vmware 13.3.0, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x975, System Layer: Oracle VMware
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 13 August 2020 22:17 by user mike.