pi john

ARMv8 Cortex-A72 testing with a BCM2835 Raspberry Pi 400 Rev 1.0 and vc4drmfb on Debian 11 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2303176-NE-PIJOHN58478.

pi johnProcessorMotherboardChipsetMemoryDiskGraphicsMonitorOSKernelDesktopDisplay ServerCompilerFile-SystemScreen ResolutionabcARMv8 Cortex-A72 @ 1.80GHz (4 Cores)BCM2835 Raspberry Pi 400 Rev 1.0Broadcom BCM27114096MB128GB SF128vc4drmfbDELL P2210HDebian 115.15.84-v8+ (aarch64)LXDEX Server 1.20.11GCC 10.2.1 20210110ext41920x1080OpenBenchmarking.orgKernel Details- snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 Compiler Details- --build=aarch64-linux-gnu --disable-libquadmath --disable-libquadmath-support --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-fix-cortex-a53-843419 --enable-gnu-unique-object --enable-languages=c,ada,c++,go,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-linux-gnu --program-prefix=aarch64-linux-gnu- --target=aarch64-linux-gnu --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-target-system-zlib=auto -v Processor Details- Scaling Governor: cpufreq-dt ondemandSecurity Details- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected

pi johnjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5draco: Liondraco: Church Facadeabc162516731466216000037588175672713014641673162321650003762317550272221625167416272162000370261757927080OpenBenchmarking.org

John The Ripper

Test: bcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptabc30060090012001500SE +/- 1.20, N = 31625146416251. (CC) gcc options: -fopenmp

John The Ripper

Test: WPA PSK

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKabc4008001200160020001673167316741. (CC) gcc options: -fopenmp

John The Ripper

Test: Blowfish

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishabc30060090012001500SE +/- 2.08, N = 31466162316271. (CC) gcc options: -fopenmp

John The Ripper

Test: HMAC-SHA512

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512abc500K1000K1500K2000K2500KSE +/- 2309.40, N = 32160000216500021620001. (CC) gcc options: -fopenmp

John The Ripper

Test: MD5

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5abc8K16K24K32K40KSE +/- 56.89, N = 33758837623370261. (CC) gcc options: -fopenmp

Google Draco

Model: Lion

OpenBenchmarking.orgms, Fewer Is BetterGoogle Draco 1.5.6Model: Lionabc4K8K12K16K20KSE +/- 16.83, N = 31756717550175791. (CXX) g++ options: -O3

Google Draco

Model: Church Facade

OpenBenchmarking.orgms, Fewer Is BetterGoogle Draco 1.5.6Model: Church Facadeabc6K12K18K24K30KSE +/- 29.67, N = 32713027222270801. (CXX) g++ options: -O3


Phoronix Test Suite v10.8.4