benchmark-php
PHP on Ubuntu 22.04
PHP
Processor: Intel Core i9-14900K (4 Cores), Motherboard: Red Hat RHEL-AV (1.16.0-4.module_el8.9.0+3659+9c8643f3 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 0GB QEMU HDD, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-92-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: CPU Microcode: 0x11d
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
PHPBench
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
PHP
Processor: Intel Core i9-14900K (4 Cores), Motherboard: Red Hat RHEL-AV (1.16.0-4.module_el8.9.0+3659+9c8643f3 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 8GB, Disk: 0GB QEMU HDD, Network: Red Hat Virtio device
OS: Ubuntu 22.04, Kernel: 5.15.0-92-generic (x86_64), Vulkan: 1.3.238, Compiler: GCC 11.4.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: NVM_CD_FLAGS=
Processor Notes: CPU Microcode: 0x11d
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 2 February 2024 19:14 by user jackewl.