xen-john

hyperv-john

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2002030-HU-2002038HU50
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Additional Graphs

Show Perf Per Core/Thread Calculation Graphs Where Applicable

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
xen
February 03 2020
  5 Minutes
lxd
February 03 2020
  5 Minutes
hyperv
February 03 2020
  5 Minutes
Invert Hiding All Results Option
  5 Minutes

Only show results where is faster than
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


xen-johnProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelCompilerFile-SystemScreen ResolutionSystem Layerxenlxdhyperv2 x Intel Xeon E3-1220 v5 (2 Cores)Xen HVM domU (4.11.1-7.2 BIOS)Intel 440FX 82441FX PMC2048MB20GBEFI VGAUbuntu 18.044.15.0-76-generic (x86_64)GCC 7.4.0ext4800x600Xen HVM domU 4.11.1-7.2Intel Xeon E3-1220 v5 @ 3.50GHz (4 Cores)Dell 0FRVY0 (2.4.3 BIOS)Intel Xeon E3-1200 v5/E3-15002 x 1000GB Seagate ST1000NM0085Matrox G200eR2B19-22 x Broadcom NetXtreme BCM5720 PCIebtrfs1280x1024lxcIntel Xeon E3-1220 v5 (2 Cores)Microsoft Virtual Machine v7.0 (090007 BIOS)Intel 440BX/ZX/DX32GB Virtual DiskMicrosoft Hyper-V virtual VGAext41152x864Microsoft Hyper-V ServerOpenBenchmarking.orgCompiler Details- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v Processor Details- xen: CPU Microcode: 0xc6- lxd: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6- hyperv: CPU Microcode: 0xffffffffSecurity Details- xen: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - lxd: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled - hyperv: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishxenlxdhyperv6001200180024003000SE +/- 0.88, N = 3SE +/- 17.58, N = 32764283524331. (CC) gcc options: -m64 -fopenmp
OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishxenlxdhyperv5001000150020002500Min: 2762 / Avg: 2763.67 / Max: 2765Min: 2400 / Avg: 2433 / Max: 24601. (CC) gcc options: -m64 -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5xenlxdhyperv40K80K120K160K200KSE +/- 80.58, N = 3SE +/- 1232.43, N = 3SE +/- 886.48, N = 31818021742701554301. (CC) gcc options: -m64 -fopenmp
OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5xenlxdhyperv30K60K90K120K150KMin: 181651 / Avg: 181802.33 / Max: 181926Min: 171808 / Avg: 174269.67 / Max: 175609Min: 154329 / Avg: 155430 / Max: 1571841. (CC) gcc options: -m64 -fopenmp