WGtest
Wireguard Linux stress test
test1
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
test2
Processor: Intel Core i3-4005U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 2048MB, Disk: 21GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1160.25.1.el7.x86_64 (x86_64), File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
test1
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 18 May 2021 14:32 by user root.
test2
Processor: Intel Core i3-4005U (1 Core), Motherboard: Oracle VirtualBox v1.2, Memory: 2048MB, Disk: 21GB VBOX HDD, Graphics: svgadrmfb
OS: CentOS Linux 7, Kernel: 3.10.0-1160.25.1.el7.x86_64 (x86_64), File-System: xfs, Screen Resolution: 2048x2048, System Layer: KVM VirtualBox
Security Notes: SELinux + itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 19 May 2021 12:09 by user root.