Test-PHPBench-28/03/2021
Intel Core i7-3630QM testing with a Intel VG10F (1.80 BIOS) and Intel HD 4000 2GB on Arch rolling via the Phoronix Test Suite.
Core i7-3630QM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Core i7-3630QM with lodded
Core i7-3630QM with video playback
Processor: Intel Core i7-3630QM @ 3.40GHz (4 Cores / 8 Threads), Motherboard: Intel VG10F (1.80 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 500GB Samsung SSD 870 + 1000GB MQ01ABD100 + 0GB Card Reader, Graphics: Intel HD 4000 2GB, Audio: IDT 92HD99BXX, Network: Qualcomm Atheros QCA8171 + Intel 7260
OS: Arch rolling, Kernel: 5.11.10-arch1-1 (x86_64), Desktop: KDE Plasma 5.21.3, Display Server: X Server 1.20.10, Display Driver: NVIDIA, OpenGL: 4.2 Mesa 21.0.1, Compiler: GCC 10.2.0, File-System: btrfs, Screen Resolution: 1366x768
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Core i7-3630QM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 17:40 by user pierrefb.
Core i7-3630QM with lodded
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 17:51 by user pierrefb.
Core i7-3630QM with video playback
Processor: Intel Core i7-3630QM @ 3.40GHz (4 Cores / 8 Threads), Motherboard: Intel VG10F (1.80 BIOS), Chipset: Intel 3rd Gen Core DRAM, Memory: 8GB, Disk: 500GB Samsung SSD 870 + 1000GB MQ01ABD100 + 0GB Card Reader, Graphics: Intel HD 4000 2GB, Audio: IDT 92HD99BXX, Network: Qualcomm Atheros QCA8171 + Intel 7260
OS: Arch rolling, Kernel: 5.11.10-arch1-1 (x86_64), Desktop: KDE Plasma 5.21.3, Display Server: X Server 1.20.10, Display Driver: NVIDIA, OpenGL: 4.2 Mesa 21.0.1, Compiler: GCC 10.2.0, File-System: btrfs, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 17:56 by user pierrefb.