test1.txt
Intel Core i7-7700K testing with a Gigabyte Z270X-UD3-CF (F2 BIOS) and Gigabyte AMD Radeon HD 5770 1GB on CentOS 7.9.2009 via the Phoronix Test Suite.
initial
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z270X-UD3-CF (F2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 2 x 16384 MB DDR4-2133MT/s CMK32GX4M2B3200C16, Disk: 512GB INTEL SSDPEKKW512G7 + 3 x 8002GB Seagate ST8000VN0022-2EL + 4001GB 2105 + 2 x 8002GB Seagate ST8000VN004-2M21 + 2 x 4001GB Western Digital WD40EFRX-68W + 2 x 6001GB Western Digital WD60EFRX-68M + 3001GB EFRX-68EUZN0, Graphics: Gigabyte AMD Radeon HD 5770 1GB (850/1200MHz), Audio: Realtek ALC1220, Monitor: S24C650 + SMS24A450, Network: Intel I219-V + 2 x Intel 82599ES 10-Gigabit SFI/SFP+
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.31.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: radeon 19.0.1, OpenGL: 3.3 Mesa 18.3.4 (LLVM 7.0.1), Compiler: GCC 4.8.5 20150623 + Clang 3.4.2 + LLVM 3.4.2, File-System: xfs, Screen Resolution: 3840x1200
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
initial
Processor: Intel Core i7-7700K @ 4.50GHz (4 Cores / 8 Threads), Motherboard: Gigabyte Z270X-UD3-CF (F2 BIOS), Chipset: Intel Xeon E3-1200 v6/7th + Z270, Memory: 2 x 16384 MB DDR4-2133MT/s CMK32GX4M2B3200C16, Disk: 512GB INTEL SSDPEKKW512G7 + 3 x 8002GB Seagate ST8000VN0022-2EL + 4001GB 2105 + 2 x 8002GB Seagate ST8000VN004-2M21 + 2 x 4001GB Western Digital WD40EFRX-68W + 2 x 6001GB Western Digital WD60EFRX-68M + 3001GB EFRX-68EUZN0, Graphics: Gigabyte AMD Radeon HD 5770 1GB (850/1200MHz), Audio: Realtek ALC1220, Monitor: S24C650 + SMS24A450, Network: Intel I219-V + 2 x Intel 82599ES 10-Gigabit SFI/SFP+
OS: CentOS 7.9.2009, Kernel: 3.10.0-1160.31.1.el7.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.4, Display Driver: radeon 19.0.1, OpenGL: 3.3 Mesa 18.3.4 (LLVM 7.0.1), Compiler: GCC 4.8.5 20150623 + Clang 3.4.2 + LLVM 3.4.2, File-System: xfs, Screen Resolution: 3840x1200
Compiler Notes: --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic
Processor Notes: Scaling Governor: intel_pstate powersave
Security Notes: SELinux + itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of IBRS (kernel) IBPB + srbds: Mitigation of Microcode + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable
Testing initiated at 23 July 2021 04:24 by user root.