2023-06-22-1612
docker testing on Ubuntu 22.04.1 LTS via the Phoronix Test Suite.
milan1
Processor: 2 x AMD EPYC 7543 32-Core @ 2.80GHz (64 Cores), Motherboard: Dell 074H08 (2.1.6 BIOS), Memory: 256GB, Disk: 960GB PERC H755 Front, Graphics: mgag200drmfb
OS: Ubuntu 22.04.1 LTS, Kernel: 5.15.0-75-generic (x86_64), Display Driver: NVIDIA, Compiler: GCC 11.2.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
milan1
Processor: 2 x AMD EPYC 7543 32-Core @ 2.80GHz (64 Cores), Motherboard: Dell 074H08 (2.1.6 BIOS), Memory: 256GB, Disk: 960GB PERC H755 Front, Graphics: mgag200drmfb
OS: Ubuntu 22.04.1 LTS, Kernel: 5.15.0-75-generic (x86_64), Display Driver: NVIDIA, Compiler: GCC 11.2.0, File-System: nfs, Screen Resolution: 1024x768, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 22 June 2023 16:12 by user fbees.