john test 1

2 x Intel Xeon E5-2650 v4 testing with a Dell 072T6D (2.3.4 BIOS) and Matrox G200eR2 on Debian 10 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2106106-IB-JOHNTEST149&grr.

john test 1ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionJT12 x Intel Xeon E5-2650 v4 @ 2.90GHz (24 Cores / 48 Threads)Dell 072T6D (2.3.4 BIOS)Intel Xeon E7 v4/Xeon8 x 16384 MB DDR4-2400MT/s M393A2K40BB1-CRC239GB PERC H730 MiniMatrox G200eR24 x Broadcom NetXtreme BCM5720 PCIe + 2 x Intel 10-Gigabit X540-AT2Debian 104.19.0-16-amd64 (x86_64)GCC 8.3.0overlayfs1024x768OpenBenchmarking.org- Transparent Huge Pages: always- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - Scaling Governor: intel_pstate powersave - CPU Microcode: 0xb00001e- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

john test 1john-the-ripper: MD5john-the-ripper: BlowfishJT1161500026159OpenBenchmarking.org

John The Ripper

Test: MD5

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5JT1300K600K900K1200K1500KSE +/- 3464.10, N = 316150001. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt

John The Ripper

Test: Blowfish

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishJT16K12K18K24K30KSE +/- 16.05, N = 3261591. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt


Phoronix Test Suite v10.8.4