ion-vpn-test-de
ion-test-3
ion-vpn-test-de
Processor: AMD Ryzen 5 2600 Six-Core @ 3.40GHz (6 Cores / 12 Threads), Motherboard: Gigabyte X470 AORUS ULTRA GAMING-CF (F60 BIOS), Chipset: AMD 17h, Memory: 16GB, Disk: 2 x Samsung SSD 960 EVO 250GB + 2 x 500GB USB 3.0 Device + 160GB INTEL SSDSA2BW16 + 16GB Seagate STORE N GO + 16GB USB SD Reader, Graphics: MSI NVIDIA GeForce GTX 1070 Ti 8GB, Audio: NVIDIA GP104 HD Audio, Monitor: C49HG9x, Network: Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.8-051108-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, Display Driver: NVIDIA 460.67, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 10.0.0-4ubuntu1 + CUDA 10.1, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Red Hat Virtio device
Processor: Intel Xeon (2 Cores), Motherboard: Vultr VC2, Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 76GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.11.5-051105-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
ARMv8 Cortex-A72 - - ROCK PI 4B
Processor: ARMv8 Cortex-A72 @ 1.42GHz (6 Cores), Motherboard: ROCK PI 4B, Chipset: Fuzhou Rockchip RK3399, Memory: 4096MB, Disk: 124GB SLD128, Monitor: 28E850
OS: Ubuntu 20.04, Kernel: 4.4.154-111-rockchip-g39b306a41b2d (aarch64), Display Server: X Server 1.20.9, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080p60
Processor Notes: Scaling Governor: cpufreq-dt interactive
6 x Intel 82583V
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: American Megatrends 5.12, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8GB, Disk: 256GB SAMSUNG MZMTE256, Graphics: Intel HD 620 (1000MHz), Monitor: SAMSUNG, Network: 6 x Intel 82583V + Ralink RT3090 802.11n 1T/1R
OS: Debian testing, Kernel: 5.11.10-051110-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.10, Compiler: GCC 10.2.1 20210110 + Clang 11.0.1-2, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
ion-test-3
Processor: Intel Core i3-2105 @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS Maximus IV Extreme-Z (0210 BIOS), Memory: 16GB, Disk: 500GB Western Digital WDS500G2B0A + 2 x 4001GB Western Digital WD40EZRX-00S + 2 x 4001GB Western Digital WD40EZRZ-00W + 4001GB HGST HUS724040AL + 2 x 10001GB Seagate ST10000VX0004-1Z + 4001GB Seagate ST4000DM000-1F21 + 1000GB USB-SATA Bridge, Graphics: nouveaudrmfb (1100MHz), Audio: Realtek ALC889, Monitor: 2 x Q2781
OS: Fedora 32, Kernel: 5.10.19-100.fc32.x86_64 (x86_64), Compiler: GCC 10.2.1 20201125, File-System: ext4, Screen Resolution: 2560x1440, System Layer: systemd-nspawn
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x17
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
ion-vpn-test-de
Processor: AMD Ryzen 5 2600 Six-Core @ 3.40GHz (6 Cores / 12 Threads), Motherboard: Gigabyte X470 AORUS ULTRA GAMING-CF (F60 BIOS), Chipset: AMD 17h, Memory: 16GB, Disk: 2 x Samsung SSD 960 EVO 250GB + 2 x 500GB USB 3.0 Device + 160GB INTEL SSDSA2BW16 + 16GB Seagate STORE N GO + 16GB USB SD Reader, Graphics: MSI NVIDIA GeForce GTX 1070 Ti 8GB, Audio: NVIDIA GP104 HD Audio, Monitor: C49HG9x, Network: Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.8-051108-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, Display Driver: NVIDIA 460.67, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 10.0.0-4ubuntu1 + CUDA 10.1, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 March 2021 23:58 by user dev.
Red Hat Virtio device
Processor: Intel Xeon (2 Cores), Motherboard: Vultr VC2, Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 4096 MB RAM QEMU, Disk: 76GB, Graphics: Cirrus Logic GD 5446, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 5.11.5-051105-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 28 March 2021 00:03 by user root.
ARMv8 Cortex-A72 - - ROCK PI 4B
Processor: ARMv8 Cortex-A72 @ 1.42GHz (6 Cores), Motherboard: ROCK PI 4B, Chipset: Fuzhou Rockchip RK3399, Memory: 4096MB, Disk: 124GB SLD128, Monitor: 28E850
OS: Ubuntu 20.04, Kernel: 4.4.154-111-rockchip-g39b306a41b2d (aarch64), Display Server: X Server 1.20.9, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1920x1080p60
Processor Notes: Scaling Governor: cpufreq-dt interactive
Testing initiated at 28 March 2021 01:49 by user root.
6 x Intel 82583V
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: American Megatrends 5.12, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8GB, Disk: 256GB SAMSUNG MZMTE256, Graphics: Intel HD 620 (1000MHz), Monitor: SAMSUNG, Network: 6 x Intel 82583V + Ralink RT3090 802.11n 1T/1R
OS: Debian testing, Kernel: 5.11.10-051110-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.10, Compiler: GCC 10.2.1 20210110 + Clang 11.0.1-2, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 11:58 by user hystou.
ion-test-3
Processor: Intel Core i3-2105 @ 3.10GHz (2 Cores / 4 Threads), Motherboard: ASUS Maximus IV Extreme-Z (0210 BIOS), Memory: 16GB, Disk: 500GB Western Digital WDS500G2B0A + 2 x 4001GB Western Digital WD40EZRX-00S + 2 x 4001GB Western Digital WD40EZRZ-00W + 4001GB HGST HUS724040AL + 2 x 10001GB Seagate ST10000VX0004-1Z + 4001GB Seagate ST4000DM000-1F21 + 1000GB USB-SATA Bridge, Graphics: nouveaudrmfb (1100MHz), Audio: Realtek ALC889, Monitor: 2 x Q2781
OS: Fedora 32, Kernel: 5.10.19-100.fc32.x86_64 (x86_64), Compiler: GCC 10.2.1 20201125, File-System: ext4, Screen Resolution: 2560x1440, System Layer: systemd-nspawn
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x17
Security Notes: itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 March 2021 12:09 by user .