test.result

Intel Xeon L5640 testing with a MSI X58 Pro-E (MS-7522) v3.0 (V8.15 BIOS) and XFX AMD Radeon R7 240/340 / 520 on Ubuntu 24.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2412290-NE-TESTRESUL83
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
mof1
December 29 2024
  1 Minute


test.resultOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon L5640 @ 2.27GHz (6 Cores / 12 Threads)MSI X58 Pro-E (MS-7522) v3.0 (V8.15 BIOS)Intel 5520/5500/X58 + ICH10R6 x 4GB 1066MT/s F3-10666CL9-4GBRL128GB INTEL SSDSC2KW12 + 1000GB Seagate ST31000424SSXFX AMD Radeon R7 240/340 / 520 (2100/875MHz)Realtek ALC889BenQ GW2780Realtek RTL8111/8168/8211/8411 + Intel Wi-Fi 6EUbuntu 24.046.8.0-51-generic (x86_64)X Server 1.21.1.11OpenCL 2.1 AMD-APP (3635.0)GCC 13.3.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerOpenCLCompilerFile-SystemScreen ResolutionTest.result BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq schedutil (Boost: Enabled) - CPU Microcode: 0x1f - GLAMOR - vBIOS Version: 113-D1820601-101- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; IBRS_FW; STIBP: conditional; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

Hashcat

Hashcat is an open-source, advanced password recovery tool supporting GPU acceleration with OpenCL, NVIDIA CUDA, and Radeon ROCm. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgH/s, More Is BetterHashcat 6.2.4Benchmark: SHA-512mof1200M400M600M800M1000MSE +/- 721880.26, N = 31105733333