phpbench on Amazon Linux 2022
amazon testing on Amazon Linux 2022 via the Phoronix Test Suite.
phpbench-al2022
Processor: Intel Xeon Platinum 8375C (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6i.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 32GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2022, Kernel: 5.15.73-45.135.amzn2022.x86_64 (x86_64), Compiler: GCC 11.3.1 20220421, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xd000331
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
phpbench-al2022
Processor: Intel Xeon Platinum 8375C (8 Cores / 16 Threads), Motherboard: Amazon EC2 c6i.4xlarge (1.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 32GB, Disk: 9GB Amazon Elastic Block Store, Network: Amazon Elastic
OS: Amazon Linux 2022, Kernel: 5.15.73-45.135.amzn2022.x86_64 (x86_64), Compiler: GCC 11.3.1 20220421, File-System: xfs, System Layer: amazon
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xd000331
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 30 October 2022 02:07 by user .