test1
Intel Core i7-6700K testing with a MSI Z170A GAMING M7 (MS-7976) v1.0 (1.L0 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 on Ubuntu 20.10 via the Phoronix Test Suite.
Mellanox MT27500
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: MSI Z170A GAMING M7 (MS-7976) v1.0 (1.L0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 500GB CT500P5SSD8 + 500GB CT500MX500SSD1 + 1000GB Western Digital WD10EZEX-00B + 2000GB Western Digital WD20EFRX-68E + 1000GB Western Digital WD10EZEX-08W + 31GB DataTraveler 3.0, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: 27EA63, Network: Mellanox MT27500 + Qualcomm Atheros Killer E2400
OS: Ubuntu 20.10, Kernel: 5.8.0-25-generic (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server 1.20.9, File-System: overlayfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6 - Thermald 2.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
Mellanox MT27500
Processor: Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads), Motherboard: MSI Z170A GAMING M7 (MS-7976) v1.0 (1.L0 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 16GB, Disk: 500GB CT500P5SSD8 + 500GB CT500MX500SSD1 + 1000GB Western Digital WD10EZEX-00B + 2000GB Western Digital WD20EFRX-68E + 1000GB Western Digital WD10EZEX-08W + 31GB DataTraveler 3.0, Graphics: Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 (1366/2000MHz), Audio: AMD Ellesmere HDMI Audio, Monitor: 27EA63, Network: Mellanox MT27500 + Qualcomm Atheros Killer E2400
OS: Ubuntu 20.10, Kernel: 5.8.0-25-generic (x86_64), Desktop: GNOME Shell 3.38.3, Display Server: X Server 1.20.9, File-System: overlayfs, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6 - Thermald 2.3
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 1 July 2021 05:46 by user ubuntu.