ion-vpn-test-de
Intel Core i3-7100U testing with a American Megatrends 5.12 and Intel HD 620 3GB on Debian testing via the Phoronix Test Suite.
ion-vpn-test-de
Processor: AMD Ryzen 5 2600 Six-Core @ 3.40GHz (6 Cores / 12 Threads), Motherboard: Gigabyte X470 AORUS ULTRA GAMING-CF (F60 BIOS), Chipset: AMD 17h, Memory: 16GB, Disk: 2 x Samsung SSD 960 EVO 250GB + 2 x 500GB USB 3.0 Device + 160GB INTEL SSDSA2BW16 + 16GB Seagate STORE N GO + 16GB USB SD Reader, Graphics: MSI NVIDIA GeForce GTX 1070 Ti 8GB, Audio: NVIDIA GP104 HD Audio, Monitor: C49HG9x, Network: Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.8-051108-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, Display Driver: NVIDIA 460.67, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 10.0.0-4ubuntu1 + CUDA 10.1, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
6 x Intel 82583V
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: American Megatrends 5.12, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 1 x 8 GB DDR4-2133MT/s, Disk: 256GB SAMSUNG MZMTE256, Graphics: Intel HD 620 3GB (1000MHz), Monitor: SAMSUNG, Network: 6 x Intel 82583V + Ralink RT3090 802.11n 1T/1R
OS: Debian testing, Kernel: 5.11.10-051110-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.4, Compiler: GCC 10.2.1 20210110 + Clang 11.0.1-2, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
ion-vpn-test-de
Processor: AMD Ryzen 5 2600 Six-Core @ 3.40GHz (6 Cores / 12 Threads), Motherboard: Gigabyte X470 AORUS ULTRA GAMING-CF (F60 BIOS), Chipset: AMD 17h, Memory: 16GB, Disk: 2 x Samsung SSD 960 EVO 250GB + 2 x 500GB USB 3.0 Device + 160GB INTEL SSDSA2BW16 + 16GB Seagate STORE N GO + 16GB USB SD Reader, Graphics: MSI NVIDIA GeForce GTX 1070 Ti 8GB, Audio: NVIDIA GP104 HD Audio, Monitor: C49HG9x, Network: Intel I211
OS: Ubuntu 20.04, Kernel: 5.11.8-051108-generic (x86_64), Desktop: GNOME Shell 3.36.4, Display Server: X Server 1.20.9, Display Driver: NVIDIA 460.67, OpenGL: 4.6.0, Compiler: GCC 10.2.0 + Clang 10.0.0-4ubuntu1 + CUDA 10.1, File-System: ext4, Screen Resolution: 3840x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0x800820d
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 26 March 2021 23:58 by user dev.
6 x Intel 82583V
Processor: Intel Core i3-7100U @ 2.40GHz (2 Cores / 4 Threads), Motherboard: American Megatrends 5.12, Chipset: Intel Xeon E3-1200 v6/7th, Memory: 1 x 8 GB DDR4-2133MT/s, Disk: 256GB SAMSUNG MZMTE256, Graphics: Intel HD 620 3GB (1000MHz), Monitor: SAMSUNG, Network: 6 x Intel 82583V + Ralink RT3090 802.11n 1T/1R
OS: Debian testing, Kernel: 5.11.10-051110-generic (x86_64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.10, OpenGL: 4.6 Mesa 20.3.4, Compiler: GCC 10.2.1 20210110 + Clang 11.0.1-2, File-System: ext4, Screen Resolution: 1366x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected
Testing initiated at 29 March 2021 17:34 by user root.