foo
foo
foo
Processor: Intel Core i7-3632QM @ 3.20GHz (4 Cores / 8 Threads), Motherboard: LENOVO 2349STC (G1ETB9WW 2.79 BIOS), Memory: 16GB, Disk: 500GB Samsung SSD 860 + 128GB SAMSUNG SSD PM83 + 63GB Cruzer Fit + 31GB Cruzer Blade, Graphics: i915drmfb (1150MHz), Audio: Realtek ALC3202
OS: Ubuntu 20.04 LTS, Kernel: 5.7.9-1-MANJARO (x86_64), File-System: overlayfs, Screen Resolution: 1920x1080, System Layer: Docker
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. The number of iterations used is 1,000,000. Learn more via the OpenBenchmarking.org test page.
foo
Processor: Intel Core i7-3632QM @ 3.20GHz (4 Cores / 8 Threads), Motherboard: LENOVO 2349STC (G1ETB9WW 2.79 BIOS), Memory: 16GB, Disk: 500GB Samsung SSD 860 + 128GB SAMSUNG SSD PM83 + 63GB Cruzer Fit + 31GB Cruzer Blade, Graphics: i915drmfb (1150MHz), Audio: Realtek ALC3202
OS: Ubuntu 20.04 LTS, Kernel: 5.7.9-1-MANJARO (x86_64), File-System: overlayfs, Screen Resolution: 1920x1080, System Layer: Docker
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 31 July 2020 10:22 by user root.