Debian 9.11 Benchmarks
Various open-source benchmarks by the Phoronix Test Suite v9.2.1 (Hurdal).
Intel Core i7-4790
Processor: Intel Core i7-4790 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: ASUS H81M-A/BR (2106 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 1 x 4096 MB DDR3-1600MHz MMXIV, Disk: 320GB SAMSUNG HD322HJ, Graphics: ASUS Intel Gen7 (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411
OS: Debian 9.11, Kernel: 4.9.0-11-amd64 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x19
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
System BZIP2 Decompression
This test measures the time to decompress a Linux kernel tarball using BZIP2. Learn more via the OpenBenchmarking.org test page.
System XZ Decompression
This test measures the time to decompress a Linux kernel tarball using XZ. Learn more via the OpenBenchmarking.org test page.
Intel Core i7-4790
Processor: Intel Core i7-4790 @ 4.00GHz (4 Cores / 8 Threads), Motherboard: ASUS H81M-A/BR (2106 BIOS), Chipset: Intel 4th Gen Core DRAM, Memory: 1 x 4096 MB DDR3-1600MHz MMXIV, Disk: 320GB SAMSUNG HD322HJ, Graphics: ASUS Intel Gen7 (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411
OS: Debian 9.11, Kernel: 4.9.0-11-amd64 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x19
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 13 February 2020 13:49 by user root.