Debian GNU/Linux 12 Benchmarks

Various open-source benchmarks by the Phoronix Test Suite v10.8.5.

HTML result view exported from: https://openbenchmarking.org/result/2410177-NE-DEBIANGNU79&grw.

Debian GNU/Linux 12 BenchmarksProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelFile-SystemScreen Resolution4 x Intel X5502 x Intel Xeon Gold 6144 @ 4.20GHz (16 Cores / 32 Threads)Dell PowerEdge R640 08HT8T (2.21.2 BIOS)Intel Sky Lake-E DMI3 Registers4 x 32 GB DDR4-2666MT/s 36ASF4G72PZ-2G6D1480GB SAMSUNG MZ7KM480 + 2 x 1920GB Micron_5400_MTFDMatrox G200eW34 x Intel X550 + 4 x Intel I350Debian GNU/Linux 126.8.12-2-pve (x86_64)ext41024x768OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x2007108- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + reg_file_data_sampling: Not affected + retbleed: Mitigation of IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS; IBPB: conditional; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Debian GNU/Linux 12 Benchmarksphpbench: PHP Benchmark Suitenetwork-loopback: Standard ErrorStandard Deviation4 x Intel X55021259346.110.04%OpenBenchmarking.org

PHPBench

PHP Benchmark Suite

OpenBenchmarking.orgScore, More Is BetterPHPBench 0.8.1PHP Benchmark Suite4 x Intel X55050K100K150K200K250KSE +/- 46.11, N = 3212593


Phoronix Test Suite v10.8.5