faye
fayetest
faye-wg
Processor: Intel Xeon E3-1240 V2 @ 3.40GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCE v0123456789 (2.00 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 4 x GB DDR3-1600MT/s HMT351E7CFR8C-PB, Disk: 2000GB Western Digital WD2003FYYS-0 + 2000GB Western Digital WD2003FYYS-7, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel I350
OS: Debian testing, Kernel: 5.9.0-3-amd64 (x86_64), File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
faye-wg
Processor: Intel Xeon E3-1240 V2 @ 3.40GHz (4 Cores / 8 Threads), Motherboard: Supermicro X9SCE v0123456789 (2.00 BIOS), Chipset: Intel Xeon E3-1200 v2/Ivy, Memory: 4 x GB DDR3-1600MT/s HMT351E7CFR8C-PB, Disk: 2000GB Western Digital WD2003FYYS-0 + 2000GB Western Digital WD2003FYYS-7, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel I350
OS: Debian testing, Kernel: 5.9.0-3-amd64 (x86_64), File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x12
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 30 November 2020 18:44 by user root.