result9php
Processor: Intel Core i5-12450H (6 Cores / 12 Threads), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 8GB
OS: Ubuntu 22.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.1 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i5-12450H (6 Cores / 12 Threads), Memory: 8GB, Disk: 0GB Virtual Disk + 2GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 8GB
OS: Ubuntu 22.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.1 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0, File-System: ext4, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 August 2024 23:45 by user ale-estrada.