phptest'
Xen HVM domU 4.2.amazon testing on Red Hat Enterprise Linux 8.4 via the Phoronix Test Suite.
Intel Xeon E5-2676 v3 - Cirrus Logic GD 5446 - Xen
Processor: Intel Xeon E5-2676 v3 (1 Core), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x GB RAM, Disk: 40GB, Graphics: Cirrus Logic GD 5446
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.19.1.el8_4.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: xfs, Screen Resolution: 1024x768, System Layer: Xen HVM domU 4.2.amazon
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Intel Xeon E5-2676 v3 - Cirrus Logic GD 5446 - Xen
Processor: Intel Xeon E5-2676 v3 (1 Core), Motherboard: Xen HVM domU (4.2.amazon BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x GB RAM, Disk: 40GB, Graphics: Cirrus Logic GD 5446
OS: Red Hat Enterprise Linux 8.4, Kernel: 4.18.0-305.19.1.el8_4.x86_64 (x86_64), Compiler: GCC 8.4.1 20200928, File-System: xfs, Screen Resolution: 1024x768, System Layer: Xen HVM domU 4.2.amazon
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x46
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 September 2021 23:23 by user root.