Ryzen 7

AMD Ryzen 7 1700 Eight-Core testing with a MSI X370 SLI PLUS (MS-7A33) v2.0 (3.JS BIOS) and AMD Radeon RX 470/480/570/570X/580/580X/590 4GB on VoidLinux rolling via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2103259-HA-RYZEN703587
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
3.6Ghz
March 25 2021
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


Ryzen 7OpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 7 1700 Eight-Core (8 Cores / 16 Threads)MSI X370 SLI PLUS (MS-7A33) v2.0 (3.JS BIOS)AMD 17h8GB320GB Seagate ST320LT007-9ZV14 + 500GB SAMSUNG HD501LJ + 320GB SAMSUNG HD322HJ + 256GB KINGSTON /256GAMD Radeon RX 470/480/570/570X/580/580X/590 4GB (1244/1750MHz)AMD Ellesmere HDMI AudioASUS VS197Realtek RTL8111/8168/8411VoidLinux rolling5.10.19_1 (x86_64)X Server 1.20.10amdgpu 19.1.04.6 Mesa 20.3.4 (LLVM 11.0.0)1.2.145GCC 10.2.1 20201203ext41366x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLVulkanCompilerFile-SystemScreen ResolutionRyzen 7 BenchmarksSystem Logs- --build=x86_64-unknown-linux-gnu --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-sjlj-exceptions --disable-target-libiberty --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-default-pie --enable-default-ssp --enable-gnu-unique-object --enable-languages=c,c++,objc,obj-c++,fortran,lto,go,ada --enable-lto --enable-plugins --enable-shared --enable-threads=posix --enable-vtable-verify --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - CPU Microcode: 0x8001138- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfish3.6Ghz30060090012001500SE +/- 1.53, N = 314751. (CC) gcc options: -m64 -lssl -lcrypto -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -std=gnu89 -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD53.6Ghz14K28K42K56K70KSE +/- 259.83, N = 3642761. (CC) gcc options: -m64 -lssl -lcrypto -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -std=gnu89 -funroll-loops