john

KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2209206-NE-JOHN3770073
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
AMD EPYC 7713 64-Core
September 20 2022
  2 Minutes


johnOpenBenchmarking.orgPhoronix Test SuiteAMD EPYC 7713 64-Core (16 Cores)QEMU Standard PC (Q35 + ICH9 2009) (rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org BIOS)Intel 82G33/G31/P35/P31 + ICH92 x 16384 MB RAM QEMU687GB QEMU HDD + QEMU HDDbochs-drmdrmfbQEMU MonitorRed Hat Virtio deviceUbuntu 20.045.4.0-125-generic (x86_64)1.1.182GCC 9.4.0ext41280x800KVMProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelVulkanCompilerFile-SystemScreen ResolutionSystem LayerJohn BenchmarksSystem Logs- Transparent Huge Pages: madvise- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-Av3uEd/gcc-9-9.4.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v - CPU Microcode: 0xa001173- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishAMD EPYC 7713 64-Core3K6K9K12K15KSE +/- 8.50, N = 3141101. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -ldl -lcrypt