phpbench-1
2 x Intel Xeon Gold 6248 testing with a Supermicro X11DPU v1.10 (3.1 BIOS) and ASPEED on Ubuntu 18.04 via the Phoronix Test Suite.
2 x Intel Xeon Gold 6248 - ASPEED - Supermicro X11DPU
Processor: 2 x Intel Xeon Gold 6248 @ 2.50GHz (40 Cores / 80 Threads), Motherboard: Supermicro X11DPU v1.10 (3.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 32 GB DDR4-2666MT/s Samsung M393A4K40CB2-CTD, Disk: 7681GB MR9361-8i + 8001GB MR9361-8i, Graphics: ASPEED, Network: 4 x Intel X710/X557-AT
OS: Ubuntu 18.04, Kernel: 4.15.0-64-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon Gold 6248 - ASPEED - Supermicro X11DPU
Processor: 2 x Intel Xeon Gold 6248 @ 2.50GHz (40 Cores / 80 Threads), Motherboard: Supermicro X11DPU v1.10 (3.1 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 12 x 32 GB DDR4-2666MT/s Samsung M393A4K40CB2-CTD, Disk: 7681GB MR9361-8i + 8001GB MR9361-8i, Graphics: ASPEED, Network: 4 x Intel X710/X557-AT
OS: Ubuntu 18.04, Kernel: 4.15.0-64-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq performance
Security Notes: l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 22 July 2020 06:33 by user root.