2023-04-24-1030
docker testing on Ubuntu 22.04.1 LTS via the Phoronix Test Suite.
skylakesp2
Processor: 2 x Intel Xeon Gold 6148 @ 3.70GHz (40 Cores / 80 Threads), Motherboard: Supermicro X11DDW-L v1.10 (2.0a BIOS), Memory: 94GB, Disk: 128GB SanDisk SD8TB8U1, Graphics: astdrmfb
OS: Ubuntu 22.04.1 LTS, Kernel: 5.4.0-146-generic (x86_64), Compiler: GCC 11.2.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2006e05
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
skylakesp2
Processor: 2 x Intel Xeon Gold 6148 @ 3.70GHz (40 Cores / 80 Threads), Motherboard: Supermicro X11DDW-L v1.10 (2.0a BIOS), Memory: 94GB, Disk: 128GB SanDisk SD8TB8U1, Graphics: astdrmfb
OS: Ubuntu 22.04.1 LTS, Kernel: 5.4.0-146-generic (x86_64), Compiler: GCC 11.2.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x2006e05
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS IBPB: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 24 April 2023 10:30 by user fbees.