phpbench acer
Docker testing on Clear Linux OS 29390 via the Phoronix Test Suite.
phpbench1
Processor: Intel Core i5-2450M @ 3.10GHz (2 Cores / 4 Threads), Motherboard: Acer JE50_HR (V1.21 BIOS), Memory: 8GB, Disk: 500GB Seagate ST9500325AS + 480GB CT480BX500SSD1, Graphics: i915drmfb (1300MHz), Audio: Realtek ALC269VB
OS: Clear Linux OS 29390, Kernel: 5.7.7-arch1-1 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, Screen Resolution: 1366x768, System Layer: Docker
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
phpbench1
Processor: Intel Core i5-2450M @ 3.10GHz (2 Cores / 4 Threads), Motherboard: Acer JE50_HR (V1.21 BIOS), Memory: 8GB, Disk: 500GB Seagate ST9500325AS + 480GB CT480BX500SSD1, Graphics: i915drmfb (1300MHz), Audio: Realtek ALC269VB
OS: Clear Linux OS 29390, Kernel: 5.7.7-arch1-1 (x86_64), Compiler: GCC 9.1.1 20190512 gcc-9-branch@271104 + Clang 8.0.0 + LLVM 8.0.0, File-System: overlayfs, Screen Resolution: 1366x768, System Layer: Docker
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2f
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion; VMX: vulnerable + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 July 2020 15:51 by user root.