VMware testing on Debian 10 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xd000375
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Processor: 2 x Intel Xeon Gold 6336Y (40 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16 x 16384 MB DRAM, Disk: 107GB Virtual disk, Graphics: VMware SVGA II, Network: 2 x VMware VMXNET3
OS: Debian 10, Kernel: 4.19.0-21-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xd000375
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 September 2022 10:50 by user root.
Processor: 2 x Intel Xeon Gold 6336Y (40 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16 x 16384 MB DRAM, Disk: 107GB Virtual disk, Graphics: VMware SVGA II, Network: 2 x VMware VMXNET3
OS: Debian 10, Kernel: 4.19.0-21-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1176x885, System Layer: VMware
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xd000375
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 September 2022 10:56 by user root.