phpbench-result
KVM testing on Debian 11 via the Phoronix Test Suite.
AMD EPYC - virtio_gpudrmfb - KVM Standard PC (Q35 +
Processor: AMD EPYC (3 Cores), Motherboard: KVM Standard PC (Q35 + ICH9 2009) (20171111 BIOS), Memory: 1 x 4000 MB RAM QEMU, Disk: 82GB QEMU HDD, Graphics: virtio_gpudrmfb, Monitor: QEMU Monitor
OS: Debian 11, Kernel: 5.10.0-22-amd64 (x86_64), Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
AMD EPYC - virtio_gpudrmfb - KVM Standard PC (Q35 +
Processor: AMD EPYC (3 Cores), Motherboard: KVM Standard PC (Q35 + ICH9 2009) (20171111 BIOS), Memory: 1 x 4000 MB RAM QEMU, Disk: 82GB QEMU HDD, Graphics: virtio_gpudrmfb, Monitor: QEMU Monitor
OS: Debian 11, Kernel: 5.10.0-22-amd64 (x86_64), Compiler: GCC 10.2.1 20210110, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of untrained return thunk; SMT disabled + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 May 2023 16:54 by user root.