Pre-alpha PHP 7.4 performance benchmarks by Michael Larabel.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (0802 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce GTX 1080 8GB (1607/5005MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V
OS: Ubuntu 19.04, Kernel: 5.1.3-050103-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.09, OpenGL: 4.6.0, OpenCL: OpenCL 2.0 beignet 1.3 + OpenCL 1.2 CUDA 10.1.120, Vulkan: 1.1.99, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 3840x2160
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
This is a wrapper around the phoronix-test-suite debug-self-test sub-command for testing hot Phoronix Test Suite code paths and if wanting to compare different PHP implementations. Learn more via the OpenBenchmarking.org test page.
Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.
This is a wrapper around the phoronix-test-suite debug-self-test sub-command for testing hot Phoronix Test Suite code paths and if wanting to compare different PHP implementations. Learn more via the OpenBenchmarking.org test page.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 10:43 by user phoronix.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 10:28 by user phoronix.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 10:12 by user phoronix.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 09:42 by user phoronix.
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 08:58 by user phoronix.
Processor: Intel Core i9-9900K @ 5.00GHz (8 Cores / 16 Threads), Motherboard: ASUS PRIME Z390-A (0802 BIOS), Chipset: Intel Cannon Lake PCH, Memory: 16384MB, Disk: Samsung SSD 970 EVO 250GB + 2000GB SABRENT, Graphics: NVIDIA GeForce GTX 1080 8GB (1607/5005MHz), Audio: Realtek ALC1220, Monitor: Acer B286HK, Network: Intel I219-V
OS: Ubuntu 19.04, Kernel: 5.1.3-050103-generic (x86_64), Desktop: GNOME Shell 3.32.0, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.09, OpenGL: 4.6.0, OpenCL: OpenCL 2.0 beignet 1.3 + OpenCL 1.2 CUDA 10.1.120, Vulkan: 1.1.99, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 3840x2160
Processor Notes: Scaling Governor: intel_pstate performance
Security Notes: l1tf: Not affected + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling
Testing initiated at 22 May 2019 09:24 by user phoronix.