before apache
Processor: Intel Core i7-13700T (16 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 12GB, Disk: 9GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: openSUSE Leap 15.6, Kernel: 6.4.0-150600.21-default (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 23.3.4 (LLVM 17.0.6 128 bits), File-System: btrfs, Screen Resolution: 1920x969, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
PHPBench is a benchmark suite for PHP. It performs a large number of simple tests in order to bench various aspects of the PHP interpreter. PHPBench can be used to compare hardware, operating systems, PHP versions, PHP accelerators and caches, compiler options, etc. Learn more via the OpenBenchmarking.org test page.
Processor: Intel Core i7-13700T (16 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: Intel 440FX 82441FX PMC, Memory: 12GB, Disk: 9GB VBOX HDD, Graphics: llvmpipe, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: openSUSE Leap 15.6, Kernel: 6.4.0-150600.21-default (x86_64), Desktop: KDE Plasma 5.27.11, Display Server: X Server 1.21.1.11, OpenGL: 4.5 Mesa 23.3.4 (LLVM 17.0.6 128 bits), File-System: btrfs, Screen Resolution: 1920x969, System Layer: Oracle VirtualBox
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Vulnerable: No microcode + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; RSB filling; PBRSB-eIBRS: SW sequence; BHI: SW loop KVM: SW loop + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 November 2024 23:29 by user .