cputest

Intel Core i5-3470 testing with a Foxconn 2ADA v1.00 (8.15 BIOS) and AMD Radeon HD 8570 / R5 430 OEM R7 240/340 520 2GB on Fedora 33 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2012021-AS-CPUTEST9704
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Intel Core i5-3470
December 02 2020
  13 Minutes


cputestOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-3470 @ 3.60GHz (4 Cores)Foxconn 2ADA v1.00 (8.15 BIOS)Intel Xeon E3-1200 v2/3rd12288MB500GB Western Digital WD5000AAKX-7AMD Radeon HD 8570 / R5 430 OEM R7 240/340 520 2GBIDT 92HD73E1X5DELL E207WFPRealtek RTL8111/8168/8411 + Ralink RT3290 802.11n 1T/1RFedora 335.9.11-200.fc33.x86_64 (x86_64)GNOME Shell 3.38.1X Server + Wayland4.5 Mesa 20.2.3 (LLVM 11.0.0)GCC 10.2.1 20201125btrfs1680x1050ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionCputest BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - Scaling Governor: intel_cpufreq schedutil- SELinux + itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5Intel Core i5-347040K80K120K160K200KSE +/- 4087.83, N = 121766041. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -ldl -lcrypt