result.txt
KVM testing on Debian 10 via the Phoronix Test Suite.
first_run
Processor: 6 x Intel Xeon E5-2650 v4 (6 Cores), Motherboard: Red Hat RHEL-AV (1.13.0-2.module_el8.3.0+555+a55c8938 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 16384 MB + 8192 MB RAM, Disk: 322GB QEMU HDD, Graphics: Red Hat QXL paravirtual graphic card, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-14-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xb000038
Security Notes: itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
first_run
Processor: 6 x Intel Xeon E5-2650 v4 (6 Cores), Motherboard: Red Hat RHEL-AV (1.13.0-2.module_el8.3.0+555+a55c8938 BIOS), Chipset: Intel 82G33/G31/P35/P31 + ICH9, Memory: 16384 MB + 8192 MB RAM, Disk: 322GB QEMU HDD, Graphics: Red Hat QXL paravirtual graphic card, Network: Red Hat Virtio device
OS: Debian 10, Kernel: 4.19.0-14-amd64 (x86_64), Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xb000038
Security Notes: itlb_multihit: Not affected + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown
Testing initiated at 13 April 2021 07:54 by user root.