JohnTheRipperLFS8.4
Testing Security on newly LFS system
clientlfs8.4JTR
Processor: AMD FX-7500 Radeon R7 10 Compute Cores 4C+6G @ 2.10GHz (2 / 4 Threads), Motherboard: HP 222D (F.20 BIOS), Chipset: AMD 15h, Memory: 7168MB, Disk: 750GB TOSHIBA MQ01ABD0, Graphics: AMD Radeon R6/R7 1GB, Audio: AMD Kaveri HDMI/DP, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9565 / AR9565
OS: Linux From Scratch 8.4, Kernel: 4.20.12 (x86_64), Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, Compiler: GCC 8.2.0 + Clang 7.0.1 + LLVM 7.0.1, File-System: ext4, Screen Resolution: 1366x768
Compiler Notes: --disable-libmpx --disable-multilib --enable-languages=c,c++,fortran,go,objc,obj-c++
Processor Notes: Scaling Governor: acpi-cpufreq userspace
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
clientlfs8.4JTR
Processor: AMD FX-7500 Radeon R7 10 Compute Cores 4C+6G @ 2.10GHz (2 / 4 Threads), Motherboard: HP 222D (F.20 BIOS), Chipset: AMD 15h, Memory: 7168MB, Disk: 750GB TOSHIBA MQ01ABD0, Graphics: AMD Radeon R6/R7 1GB, Audio: AMD Kaveri HDMI/DP, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9565 / AR9565
OS: Linux From Scratch 8.4, Kernel: 4.20.12 (x86_64), Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, Compiler: GCC 8.2.0 + Clang 7.0.1 + LLVM 7.0.1, File-System: ext4, Screen Resolution: 1366x768
Compiler Notes: --disable-libmpx --disable-multilib --enable-languages=c,c++,fortran,go,objc,obj-c++
Processor Notes: Scaling Governor: acpi-cpufreq userspace
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling
Testing initiated at 1 August 2019 02:14 by user root.