wg
KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.
2 core 4790
Processor: Intel Core i7-4790 (2 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (0.0.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 54GB QEMU HDD, Graphics: Red Hat QXL paravirtual graphic card, Monitor: 2 x QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-24-generic (x86_64), Desktop: GNOME Shell 3.36.1, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, File-System: ext4, Screen Resolution: 1920x989, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
2 core 4790
Processor: Intel Core i7-4790 (2 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (0.0.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 54GB QEMU HDD, Graphics: Red Hat QXL paravirtual graphic card, Monitor: 2 x QEMU Monitor, Network: Red Hat Virtio device
OS: Ubuntu 20.04, Kernel: 5.4.0-24-generic (x86_64), Desktop: GNOME Shell 3.36.1, Display Server: X Server 1.20.7, Display Driver: modesetting 1.20.7, File-System: ext4, Screen Resolution: 1920x989, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 20 April 2020 17:15 by user root.