phpbench74.results
KVM testing on Amazon Linux 2 via the Phoronix Test Suite.
phpbench74-c5.xlarge
Processor: Intel Xeon Platinum 8275CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 4.14.219-161.340.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: KVM
Kernel Notes: nvme_core.io_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003005
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
phpbench74-c5.xlarge
Processor: Intel Xeon Platinum 8275CL (2 Cores / 4 Threads), Motherboard: Amazon EC2 c5.xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 8GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2, Kernel: 4.14.219-161.340.amzn2.x86_64 (x86_64), Compiler: GCC 7.3.1 20180712, File-System: xfs, System Layer: KVM
Kernel Notes: nvme_core.io_timeout=4294967295 - Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x5003005
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 March 2021 19:31 by user root.