test.txt

2 x Intel Xeon Gold 6240 testing with a Intel S2600WFT (SE5C620.86B.02.01.0012.070720200218 BIOS) and ASPEED on CentOS 7.9.2009 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2012143-AS-TESTTXT0033
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
johntest1
December 14 2020
  7 Minutes


test.txtOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Gold 6240 @ 3.90GHz (36 Cores / 72 Threads)Intel S2600WFT (SE5C620.86B.02.01.0012.070720200218 BIOS)Intel Sky Lake-E DMI3 Registers12 x 32 GB DDR4-2933MT/s Micron 18ASF4G72PZ-2G9B12 x 1600GB SAMSUNG MZPLJ1T6HBJR-00007 + 43GB MR9480-8i8eASPEEDLCD2 x Intel X722 for 10GBASE-T + 2 x Intel 10G X550T + 2 x Intel I350CentOS 7.9.20093.10.0-1160.6.1.el7.x86_64 (x86_64)GCC 4.8.5 20150623ext41440x900ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelCompilerFile-SystemScreen ResolutionTest.txt BenchmarksSystem Logs- Scaling Governor: intel_pstate powersave- SELinux + itlb_multihit: vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishjohntest19K18K27K36K45KSE +/- 1033.42, N = 12429891. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt