test1

Intel Core i7-6700K testing with a MSI Z170A GAMING M7 (MS-7976) v1.0 (1.L0 BIOS) and Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 on Ubuntu 20.10 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2107016-IB-TEST1898911.

test1ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerFile-SystemScreen ResolutionMellanox MT27500Intel Core i7-6700K @ 4.20GHz (4 Cores / 8 Threads)MSI Z170A GAMING M7 (MS-7976) v1.0 (1.L0 BIOS)Intel Xeon E3-1200 v5/E3-150016GB500GB CT500P5SSD8 + 500GB CT500MX500SSD1 + 1000GB Western Digital WD10EZEX-00B + 2000GB Western Digital WD20EFRX-68E + 1000GB Western Digital WD10EZEX-08W + 31GB DataTraveler 3.0Sapphire AMD Radeon RX 470/480/570/570X/580/580X/590 (1366/2000MHz)AMD Ellesmere HDMI Audio27EA63Mellanox MT27500 + Qualcomm Atheros Killer E2400Ubuntu 20.105.8.0-25-generic (x86_64)GNOME Shell 3.38.3X Server 1.20.9overlayfs1920x1080OpenBenchmarking.org- Transparent Huge Pages: madvise- Scaling Governor: intel_pstate powersave - CPU Microcode: 0xc6 - Thermald 2.3- itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable

test1wireguard: Standard ErrorStandard DeviationMellanox MT27500189.9351.221.12%OpenBenchmarking.org

WireGuard + Linux Networking Stack Stress Test

OpenBenchmarking.orgSeconds, Fewer Is BetterWireGuard + Linux Networking Stack Stress TestMellanox MT275004080120160200SE +/- 1.22, N = 3189.94


Phoronix Test Suite v10.8.4