test-php-zend
docker testing on Ubuntu 16.04.4 LTS via the Phoronix Test Suite.
test-php-zend-vm
Processor: 2 x Common KVM (16 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Memory: 30GB, Disk: 125GB QEMU HDD, Graphics: bochsdrmfb, Monitor: QEMU Monitor
OS: Ubuntu 16.04.4 LTS, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 5.4.0 20160609, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: docker
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
PHP Micro Benchmarks
Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.
test-php-zend-vm
Processor: 2 x Common KVM (16 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Memory: 30GB, Disk: 125GB QEMU HDD, Graphics: bochsdrmfb, Monitor: QEMU Monitor
OS: Ubuntu 16.04.4 LTS, Kernel: 3.10.0-1062.12.1.el7.x86_64 (x86_64), Compiler: GCC 5.4.0 20160609, File-System: overlayfs, Screen Resolution: 1024x768, System Layer: docker
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + tsx_async_abort: Not affected
Testing initiated at 28 February 2020 23:34 by user root.