Debian 10 Performance

Various open-source benchmarks by the Phoronix Test Suite v10.2.2 (Harstad).

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2105110-HA-DEBIAN10P35
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel Core i5-5200U
May 11 2021
  6 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


Debian 10 PerformanceOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-5200U @ 2.10GHz (2 Cores / 4 Threads)INTEL CRESCENTBAY (5.6.5 BIOS)Intel Broadwell-U-OPI8GB480GB KINGSTON SUV500MIntel HD 5500 3GB (900MHz)Intel Broadwell-U AudioPL2409HDRealtek RTL8111/8168/8411 + Broadcom BCM43224 802.11a/b/g/nDebian 104.19.0-16-amd64 (x86_64)GNOME Shell 3.30.2X Server + Wayland4.5 Mesa 18.3.6GCC 8.3.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionDebian 10 Performance BenchmarksSystem Logs- Transparent Huge Pages: always- Scaling Governor: intel_pstate powersave - CPU Microcode: 0x16- OpenJDK Runtime Environment (build 11.0.9.1+1-post-Debian-1deb10u2)- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected

Debian 10 Performanceintel-mlc: Peak Injection Bandwidth - All Readsintel-mlc: Peak Injection Bandwidth - 3:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 2:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - 1:1 Reads-Writesintel-mlc: Peak Injection Bandwidth - Stream-Triad Likephp: Zend benchphp: Zend micro_benchIntel Core i5-5200U12139.211531.910994.911213.111394.70.7634.035OpenBenchmarking.org

Intel Memory Latency Checker

Intel Memory Latency Checker (MLC) is a binary-only system memory bandwidth and latency benchmark. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency CheckerTest: Peak Injection Bandwidth - All ReadsIntel Core i5-5200U3K6K9K12K15KSE +/- 59.14, N = 312139.2

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency CheckerTest: Peak Injection Bandwidth - 3:1 Reads-WritesIntel Core i5-5200U2K4K6K8K10KSE +/- 112.04, N = 311531.9

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency CheckerTest: Peak Injection Bandwidth - 2:1 Reads-WritesIntel Core i5-5200U2K4K6K8K10KSE +/- 590.32, N = 310994.9

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency CheckerTest: Peak Injection Bandwidth - 1:1 Reads-WritesIntel Core i5-5200U2K4K6K8K10KSE +/- 53.32, N = 311213.1

OpenBenchmarking.orgMB/s, More Is BetterIntel Memory Latency CheckerTest: Peak Injection Bandwidth - Stream-Triad LikeIntel Core i5-5200U2K4K6K8K10KSE +/- 67.14, N = 311394.7

PHP Micro Benchmarks

Various small PHP micro-benchmarks. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterPHP Micro BenchmarksTest: Zend benchIntel Core i5-5200U0.17170.34340.51510.68680.8585SE +/- 0.000, N = 30.763

OpenBenchmarking.orgSeconds, Fewer Is BetterPHP Micro BenchmarksTest: Zend micro_benchIntel Core i5-5200U0.90791.81582.72373.63164.5395SE +/- 0.007, N = 34.035