X470 John MD5

AMD Ryzen 7 1800X Eight-Core testing with a Gigabyte X470 AORUS GAMING 5 WIFI-CF (F3 BIOS) and ASUS AMD Radeon RX 470/480/570/570X/580/580X/590 8GB on ManjaroLinux 20.0 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2005090-ELEC-X470JOH20
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
X470
May 10 2020
  4 Minutes


X470 John MD5OpenBenchmarking.orgPhoronix Test Suite 10.6.0AMD Ryzen 7 1800X Eight-Core @ 3.60GHz (8 Cores / 16 Threads)Gigabyte X470 AORUS GAMING 5 WIFI-CF (F3 BIOS)AMD 17h16GB2000GB Seagate ST2000LX001-1RG1 + 8GB DataTraveler 3.0 + 1000GB Western Digital WDS100T2B0BASUS AMD Radeon RX 470/480/570/570X/580/580X/590 8GB (1411/2000MHz)AMD Ellesmere HDMI Audio2490W1 + Acer P221WIntel I211 + Intel-AC 9260ManjaroLinux 20.05.4.38-1-MANJARO (x86_64)X Server 1.20.8modesetting 1.20.84.6 Mesa 20.0.6 (LLVM 10.0.0)GCC 9.3.0ext43600x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionX470 John MD5 BenchmarksSystem Logs- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x8001137- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5X470100K200K300K400K500KSE +/- 6443.63, N = 34767881. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2