Wireguard
Case closed / no active cooling
RPi3B
Processor: ARMv8 Cortex-A53 @ 1.20GHz (4 Cores), Motherboard: raspberrypi rpi (2020.04 BIOS), Memory: 935MB, Disk: 64GB SB64G, Graphics: vc4drmfb
OS: Fedora 32, Kernel: 5.8.6-201.fc32.aarch64 (aarch64) 20200904, Compiler: GCC 10.2.1 20200723, File-System: btrfs, Screen Resolution: 720x480
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
SamsungNP3005l
Processor: Intel Core i3-6006U @ 2.00GHz (2 Cores / 4 Threads), Motherboard: SAMSUNG NP300E5L-KF1BR (P08RED.021.181123.ZW BIOS), Chipset: Intel Skylake, Memory: 2 x 4096 MB DDR4-2133MT/s SF464128CKHIWDFSEG, Disk: 1000GB Western Digital WD10JPVX-35J, Graphics: Intel HD 520 3GB (900MHz), Audio: Realtek ALC256, Network: Realtek RTL8101/2/6E + Qualcomm Atheros QCA9377 802.11ac
OS: Debian stable-updates, Kernel: 4.19.0-10-amd64 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 18.3.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
RPi3B
Processor: ARMv8 Cortex-A53 @ 1.20GHz (4 Cores), Motherboard: raspberrypi rpi (2020.04 BIOS), Memory: 935MB, Disk: 64GB SB64G, Graphics: vc4drmfb
OS: Fedora 32, Kernel: 5.8.6-201.fc32.aarch64 (aarch64) 20200904, Compiler: GCC 10.2.1 20200723, File-System: btrfs, Screen Resolution: 720x480
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Not affected + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 September 2020 15:29 by user khalil.
SamsungNP3005l
Processor: Intel Core i3-6006U @ 2.00GHz (2 Cores / 4 Threads), Motherboard: SAMSUNG NP300E5L-KF1BR (P08RED.021.181123.ZW BIOS), Chipset: Intel Skylake, Memory: 2 x 4096 MB DDR4-2133MT/s SF464128CKHIWDFSEG, Disk: 1000GB Western Digital WD10JPVX-35J, Graphics: Intel HD 520 3GB (900MHz), Audio: Realtek ALC256, Network: Realtek RTL8101/2/6E + Qualcomm Atheros QCA9377 802.11ac
OS: Debian stable-updates, Kernel: 4.19.0-10-amd64 (x86_64), Desktop: KDE Plasma 5.17.5, Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, OpenGL: 4.5 Mesa 18.3.6, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 16 September 2020 19:08 by user root.