jtr-centos

Oracle VMware testing on Ubuntu 20.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2101011-FI-2101018FI53
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
jtr-centos
January 01 2021
  2 Minutes
comparacion_ubuntu-centos
January 01 2021
  2 Minutes
Invert Hiding All Results Option
  2 Minutes


jtr-centosProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelFile-SystemScreen ResolutionSystem LayerCompilerjtr-centoscomparacion_ubuntu-centosIntel Core i7-10510U (1 Core)Oracle VirtualBox v1.2Intel 440FX 82441FX PMC4096MB2 x 9GB VBOX HDDVMware SVGA IIIntel 82801AA AC 97 Audio2 x Intel 82540EMCentOS Linux 84.18.0-193.el8.x86_64 (x86_64)xfs2048x2048Oracle VMware2 x 11GB VBOX HDDUbuntu 20.045.4.0-52-generic (x86_64)GCC 9.3.0ext4OpenBenchmarking.orgSecurity Details- jtr-centos: SELinux + itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected - comparacion_ubuntu-centos: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected Compiler Details- comparacion_ubuntu-centos: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishjtr-centoscomparacion_ubuntu-centos30060090012001500SE +/- 11.46, N = 3SE +/- 4.04, N = 3152315741. (CC) gcc options: -O3 --param -std=gnu89
OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishjtr-centoscomparacion_ubuntu-centos30060090012001500Min: 1509 / Avg: 1523.33 / Max: 1546Min: 1569 / Avg: 1574 / Max: 15821. (CC) gcc options: -O3 --param -std=gnu89