test01

Intel Core i5 760 testing with a Gigabyte P55-USB3 (F10g BIOS) and MSI NVIDIA GeForce GTX 1070 8GB on Linuxmint 20.1 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2105022-HA-TEST0171778
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
test01_2021-05-2
May 02 2021
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


test01OpenBenchmarking.orgPhoronix Test SuiteIntel Core i5 760 @ 2.79GHz (4 Cores)Gigabyte P55-USB3 (F10g BIOS)Intel Core DMI12GB500GB Samsung SSD 850 + 80GB SAMSUNG SP0812C + 512GB Crucial CT512MX1 + 2 x 4001GB Western Digital WD40EFRX-68NMSI NVIDIA GeForce GTX 1070 8GBRealtek ALC892Acer X34ARealtek RTL8111/8168/8411Linuxmint 20.15.4.0-72-generic (x86_64)Cinnamon 4.8.6X Server 1.20.9NVIDIA 460.73.014.6.01.2.155GCC 9.3.0ext43440x1440ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLVulkanCompilerFile-SystemScreen ResolutionTest01 BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishtest01_2021-05-28001600240032004000SE +/- 21.50, N = 33521

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5test01_2021-05-220K40K60K80K100KSE +/- 133.60, N = 3110859