phoronix-x5690

Intel Xeon X5690 testing with a ASUS SABERTOOTH X58 (1402 BIOS) and NVIDIA GeForce RTX 2080 8GB on ManjaroLinux 18.0.4 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1907212-HV-PHORONIXX20
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
1
July 21 2019
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


phoronix-x5690OpenBenchmarking.orgPhoronix Test SuiteIntel Xeon X5690 @ 3.47GHz (6 Cores / 12 Threads)ASUS SABERTOOTH X58 (1402 BIOS)Intel 5520/5500/X58 + ICH10R22528MB480GB SATA SSD + 240GB SATA SSD + 8002GB Western Digital WD80EMAZ-00W + 4001GB Seagate ST4000DM005-2DP1NVIDIA GeForce RTX 2080 8GB (1515/7000MHz)C-Media CMI8788Realtek RTL-8110SC/8169SCManjaroLinux 18.0.45.1.18-1-MANJARO (x86_64)Cinnamon 4.2.2X Server 1.20.5NVIDIA 430.264.6.0GCC 9.1.0ext45360x1440ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionPhoronix-x5690 BenchmarksSystem Logs- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: acpi-cpufreq schedutil- l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfish114002800420056007000SE +/- 9.21, N = 365221. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5150K100K150K200K250KSE +/- 722.37, N = 32424181. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2