sha512-run1

2 x Intel Xeon E5-2630 v4 testing with a Dell 0NT78X (2.11.0 BIOS) and NVIDIA Quadro M2000 4GB on Ubuntu 22.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2311302-NE-SHA512RUN62
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
blah
November 30 2023
  1 Minute


sha512-run1OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2630 v4 @ 3.10GHz (20 Cores / 40 Threads)Dell 0NT78X (2.11.0 BIOS)Intel Xeon E7 v4/Xeon32GB2000GB Seagate ST2000DM008-2FR1NVIDIA Quadro M2000 4GBNVIDIA GM206 HD AudioTOSHIBA-TV2 x Intel I350Ubuntu 22.046.2.0-37-generic (x86_64)GNOME Shell 42.9X Server 1.21.1.4NVIDIAOpenCL 3.0 CUDA 12.2.1471.3.242GCC 11.4.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenCLVulkanCompilerFile-SystemScreen ResolutionSha512-run1 BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0xb000040- BAR1 / Visible vRAM Size: 256 MiB - vBIOS Version: 84.06.51.00.05- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT vulnerable

Hashcat

Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.2.4Benchmark: SHA-512blah40M80M120M160M200MSE +/- 88191.71, N = 3176233333