2 x Intel Xeon E5-2620 v2 testing with a ASUS Z9PE-D8 WS (5503 BIOS) and ASPEED on CentOS Stream 9 via the Phoronix Test Suite.
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2404229-NE-JOHNTHERI79
{
"title": "john-the-ripper-1.8.0run",
"last_modified": "2024-04-22 08:09:56",
"description": "2 x Intel Xeon E5-2620 v2 testing with a ASUS Z9PE-D8 WS (5503 BIOS) and ASPEED on CentOS Stream 9 via the Phoronix Test Suite.",
"systems": {
"NewGVNTrunkO2": {
"identifier": "NewGVNTrunkO2",
"hardware": {
"Processor": "2 x Intel Xeon E5-2620 v2 @ 2.60GHz (12 Cores \/ 24 Threads)",
"Motherboard": "ASUS Z9PE-D8 WS (5503 BIOS)",
"Chipset": "Intel Xeon E7 v2\/Xeon",
"Memory": "32GB",
"Disk": "256GB Samsung SSD 850 + 2000GB Western Digital WD20EARX-00P",
"Graphics": "ASPEED",
"Audio": "Realtek ALC898",
"Network": "2 x Intel 82574L"
},
"software": {
"OS": "CentOS Stream 9",
"Kernel": "5.14.0-437.el9.x86_64 (x86_64)",
"Display Server": "X Server",
"Compiler": "GCC 11.4.1 20231218 + PGI Compiler 16.10-0 + LLVM 3.1 + CUDA 11.2",
"File-System": "ext4",
"Screen Resolution": "1024x768"
},
"timestamp": "2024-04-22 07:57:56",
"client_version": "10.8.4",
"data": {
"compiler-configuration": "Optimized build with assertions; Built Apr 11 2013 (07:43:48); Default target: i386-pc-linux-gnu; Host CPU: i686",
"cpu-scaling-governor": "intel_cpufreq conservative",
"cpu-microcode": "0x42e",
"kernel-extra-details": "Transparent Huge Pages: always",
"environment-variables": "CXXFLAGS=\"-O2 -mllvm -enable-newgvn\" CFLAGS=\"-O2 -mllvm -enable-newgvn\"",
"security": "gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy\/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected"
}
}
},
"results": {
"0bba70442ccef3c16d8c11296ce34e97afaf79ec": {
"identifier": "pts\/john-the-ripper-1.8.0",
"title": "John The Ripper",
"app_version": "2023.03.14",
"arguments": "--format=bcrypt",
"description": "Test: bcrypt",
"scale": "Real C\/S",
"proportion": "HIB",
"display_format": "BAR_GRAPH",
"results": {
"NewGVNTrunkO2": {
"value": 793,
"raw_values": [
793,
795,
791
],
"test_run_times": [
32.03999999999999914734871708787977695465087890625,
30.21000000000000085265128291212022304534912109375,
30.21000000000000085265128291212022304534912109375
]
}
}
},
"d947a726695b287368728343e9bd3f5fa54352ee": {
"identifier": "pts\/john-the-ripper-1.8.0",
"title": "John The Ripper",
"app_version": "2023.03.14",
"arguments": "--format=wpapsk",
"description": "Test: WPA PSK",
"scale": "Real C\/S",
"proportion": "HIB",
"display_format": "BAR_GRAPH",
"results": {
"NewGVNTrunkO2": {
"value": 1006,
"raw_values": [
1002,
1017,
999
],
"test_run_times": [
30.260000000000001563194018672220408916473388671875,
30.260000000000001563194018672220408916473388671875,
30.260000000000001563194018672220408916473388671875
]
}
}
},
"abf686acbd8ce65f95c11a197239813fcd6d9bd6": {
"identifier": "pts\/john-the-ripper-1.8.0",
"title": "John The Ripper",
"app_version": "2023.03.14",
"arguments": "--format=bcrypt",
"description": "Test: Blowfish",
"scale": "Real C\/S",
"proportion": "HIB",
"display_format": "BAR_GRAPH",
"results": {
"NewGVNTrunkO2": {
"value": 800,
"raw_values": [
807,
787,
807
],
"test_run_times": [
30.219999999999998863131622783839702606201171875,
30.219999999999998863131622783839702606201171875,
30.21000000000000085265128291212022304534912109375
]
}
}
},
"3e1cb54a760b7e9cb4de9c80c5e876b860efc4c7": {
"identifier": "pts\/john-the-ripper-1.8.0",
"title": "John The Ripper",
"app_version": "2023.03.14",
"arguments": "--format=HMAC-SHA512",
"description": "Test: HMAC-SHA512",
"scale": "Real C\/S",
"proportion": "HIB",
"display_format": "BAR_GRAPH",
"results": {
"NewGVNTrunkO2": {
"value": 1462000,
"raw_values": [
1453000,
1467000,
1466000
],
"test_run_times": [
60.1099999999999994315658113919198513031005859375,
60.1099999999999994315658113919198513031005859375,
60.1099999999999994315658113919198513031005859375
]
}
}
},
"dbb8b65bdc22d521f333e2462b391ccc9aacd03a": {
"identifier": "pts\/john-the-ripper-1.8.0",
"title": "John The Ripper",
"app_version": "2023.03.14",
"arguments": "--format=md5crypt",
"description": "Test: MD5",
"scale": "Real C\/S",
"proportion": "HIB",
"display_format": "BAR_GRAPH",
"results": {
"NewGVNTrunkO2": {
"value": 29697,
"raw_values": [
29802,
29768,
29520
],
"test_run_times": [
60.17999999999999971578290569595992565155029296875,
60.17999999999999971578290569595992565155029296875,
60.17999999999999971578290569595992565155029296875
]
}
}
}
}
}