KVM testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: AMD EPYC 7713 64-Core (4 Cores), Motherboard: Linode Compute Instance, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 8 GB RAM QEMU, Disk: 171GB QEMU HDD + QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-86-generic (x86_64), File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xa0011d1
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Processor: AMD EPYC 7713 64-Core (4 Cores), Motherboard: Linode Compute Instance, Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 1 x 8 GB RAM QEMU, Disk: 171GB QEMU HDD + QEMU HDD, Graphics: bochs-drmdrmfb, Monitor: QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-86-generic (x86_64), File-System: ext4, Screen Resolution: 1280x800, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xa0011d1
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 19 October 2023 11:51 by user root.