Wireguard_Test

AMD Ryzen 7 2700X Eight-Core testing with a ASRock X470 Taichi (P3.60 BIOS) and AMD Radeon RX 56/64 8GB on ManjaroLinux 20.0 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2004214-VE-WIREGUARD42
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Wireguard_Test
April 21 2020
  14 Minutes


Wireguard_TestOpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 7 2700X Eight-Core @ 3.70GHz (8 Cores / 16 Threads)ASRock X470 Taichi (P3.60 BIOS)AMD 17h4 x 8192 MB DDR4-3334MT/s F4-3200C16-8GVKB1024GB HP SSD EX920 1TB + HP SSD EX920 512GB + 2048GB ADATA SU800 + 1024GB ADATA SU800 + 500GBAMD Radeon RX 56/64 8GB (1612/1050MHz)AMD Vega 10 HDMI AudioDELL U2718QIntel I211 + Intel Dual Band-AC 3168NGWManjaroLinux 20.05.6.5-3-MANJARO-VFIO (x86_64)KDE Plasma 5.18.4X Server 1.20.8amdgpu 19.1.04.6 Mesa 20.0.4 (LLVM 9.0.1)OpenCL 2.1 AMD-APP (3004.6) + OpenCL 1.1 Mesa 20.0.41.2.135GCC 9.3.0 + Clang 9.0.1 + LLVM 9.0.1ext43840x2160ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLOpenCLVulkanCompilerFile-SystemScreen ResolutionWireguard_Test BenchmarksSystem Logs- kvm_amd.npt=1 amdgpu.ppfeaturemask=0xffffffff- Scaling Governor: acpi-cpufreq performance - CPU Microcode: 0x800820d- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + tsx_async_abort: Not affected

WireGuard + Linux Networking Stack Stress Test

This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterWireGuard + Linux Networking Stack Stress TestWireguard_Test60120180240300SE +/- 1.60, N = 3267.08