2 x Intel Xeon Platinum 8180M

2 x Intel Xeon Platinum 8180M testing with a Dell 014X06 (2.2.11 BIOS) and Matrox G200eW3 32GB on CentOS Linux 8 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2003112-CLDO-2XINTEL73
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
blowfish
March 11 2020
  2 Minutes


2 x Intel Xeon Platinum 8180MOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Platinum 8180M (56 Cores / 112 Threads)Dell 014X06 (2.2.11 BIOS)Intel Sky Lake-E DMI3 Registers3022GB2 x 6401GB Dell Flash PM1725b 6.4TB AIC + 240GB DELLBOSS VDMatrox G200eW3 32GB4 x Intel X710 for 10GbE SFP+CentOS Linux 84.18.0-147.5.1.el8_1.x86_64 (x86_64)X ServerGCC 8.3.1 20190507nfs1920x1200ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDisplay ServerCompilerFile-SystemScreen Resolution2 X Intel Xeon Platinum 8180M BenchmarksSystem Logs- nouveau.modeset=0- --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - CPU Microcode: 0x200005e- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishblowfish17K34K51K68K85KSE +/- 137.99, N = 377081