JtR-test1
microsoft testing on Ubuntu 20.04 via the Phoronix Test Suite.
test1
Processor: AMD Ryzen 7 2700X Eight-Core (8 Cores / 16 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 4.19.104-microsoft-standard (x86_64), Display Server: X Server, Compiler: GCC 5.5.0, File-System: ext4, System Layer: microsoft
Compiler Notes: --disable-multilib --disable-nls --enable-checking=release --enable-languages=c,c++,objc,obj-c++,fortran --with-boot-ldflags='-static-libstdc++ --with-gmp=/home/linuxbrew/.linuxbrew/opt/gmp --with-mpc=/home/linuxbrew/.linuxbrew/opt/libmpc --with-mpfr=/home/linuxbrew/.linuxbrew/opt/mpfr -static-libgcc
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
test1
Processor: AMD Ryzen 7 2700X Eight-Core (8 Cores / 16 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 4.19.104-microsoft-standard (x86_64), Display Server: X Server, Compiler: GCC 5.5.0, File-System: ext4, System Layer: microsoft
Compiler Notes: --disable-multilib --disable-nls --enable-checking=release --enable-languages=c,c++,objc,obj-c++,fortran --with-boot-ldflags='-static-libstdc++ --with-gmp=/home/linuxbrew/.linuxbrew/opt/gmp --with-mpc=/home/linuxbrew/.linuxbrew/opt/libmpc --with-mpfr=/home/linuxbrew/.linuxbrew/opt/mpfr -static-libgcc
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 11 July 2020 07:10 by user logan.