john-the-ripper-base
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0 + GCC 11.4.0, File-System: nfs, Screen Resolution: 1600x1200
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LDFLAGS=
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x49
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0 + GCC 11.4.0, File-System: nfs, Screen Resolution: 1600x1200
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: LDFLAGS=
Processor Notes: Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x49
Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 October 2023 19:22 by user mciverj.