wg

KVM testing on Ubuntu 20.04 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2004208-VE-WG985434785.

wgProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverFile-SystemScreen ResolutionSystem Layer2 core 4790Intel Core i7-4790 (2 Cores)QEMU Standard PC (i440FX + PIIX 1996) (0.0.0 BIOS)Intel 440FX 82441FX PMC1 x 4096 MB RAM QEMU54GB QEMU HDDRed Hat QXL paravirtual graphic card2 x QEMU MonitorRed Hat Virtio deviceUbuntu 20.045.4.0-24-generic (x86_64)GNOME Shell 3.36.1X Server 1.20.7modesetting 1.20.7ext41920x989KVMOpenBenchmarking.org- CPU Microcode: 0x1- itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected

wgwireguard: Standard ErrorStandard Deviation2 core 4790429.8905.672.29%OpenBenchmarking.org

WireGuard + Linux Networking Stack Stress Test

OpenBenchmarking.orgSeconds, Fewer Is BetterWireGuard + Linux Networking Stack Stress Test2 core 479090180270360450SE +/- 5.67, N = 3429.89


Phoronix Test Suite v10.8.4