result.txt
KVM testing on Ubuntu 18.04 via the Phoronix Test Suite.
first_run
Processor: 2 x AMD EPYC 7281 16-Core (2 Cores), Motherboard: Scaleway SCW-DEV1-S (0.0.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 2048 MB RAM QEMU, Disk: 19GB, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-140-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
first_run
Processor: 2 x AMD EPYC 7281 16-Core (2 Cores), Motherboard: Scaleway SCW-DEV1-S (0.0.0 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 2048 MB RAM QEMU, Disk: 19GB, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-140-generic (x86_64), Compiler: GCC 7.5.0, File-System: ext4, System Layer: KVM
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0x1000065
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 13 April 2021 08:07 by user root.