testi
ARMv8 Cortex-A72 testing on Ubuntu 21.04 via the Phoronix Test Suite.
Testi-wg
Processor: ARMv8 Cortex-A72 @ 2.20GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.4, Chipset: Broadcom BCM2711, Memory: 8GB, Disk: 128GB SC128, Graphics: vc4drmfb, Monitor: LG Ultra HD
OS: Ubuntu 21.04, Kernel: 5.11.0-1010-raspi (aarch64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.11, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
wg0 test
Processor: ARMv8 Cortex-A72 @ 2.20GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.4, Chipset: Broadcom BCM2711, Memory: 8GB, Disk: 128GB SC128, Monitor: LG TV
OS: Ubuntu 21.04, Kernel: 5.11.0-1014-raspi (aarch64), Display Server: X Server 1.20.11, Compiler: GCC 10.3.0, File-System: ext4
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
Testi-wg
Processor: ARMv8 Cortex-A72 @ 2.20GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.4, Chipset: Broadcom BCM2711, Memory: 8GB, Disk: 128GB SC128, Graphics: vc4drmfb, Monitor: LG Ultra HD
OS: Ubuntu 21.04, Kernel: 5.11.0-1010-raspi (aarch64), Desktop: GNOME Shell 3.38.4, Display Server: X Server 1.20.11, Compiler: GCC 10.3.0, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 18 June 2021 21:51 by user episode.
wg0 test
Processor: ARMv8 Cortex-A72 @ 2.20GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 4 Model B Rev 1.4, Chipset: Broadcom BCM2711, Memory: 8GB, Disk: 128GB SC128, Monitor: LG TV
OS: Ubuntu 21.04, Kernel: 5.11.0-1014-raspi (aarch64), Display Server: X Server 1.20.11, Compiler: GCC 10.3.0, File-System: ext4
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 July 2021 13:25 by user episode.