wireguardtest_01
AMD Ryzen 7 5800X3D 8-Core testing with a ASRock X570S PG Riptide (P2.20 BIOS) and Sapphire AMD Radeon RX 6700 XT on ManjaroLinux 23.1.3 via the Phoronix Test Suite.
wireguardtest_20240224
Processor: AMD Ryzen 7 5800X3D 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: ASRock X570S PG Riptide (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: Sapphire AMD Radeon RX 6700 XT, Audio: AMD Navi 21/23, Monitor: MSI MS321UP, Network: Realtek Killer E3000 2.5GbE
OS: ManjaroLinux 23.1.3, Kernel: 6.6.16-2-MANJARO (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-manjaro1.1 (LLVM 16.0.6 DRM 3.54), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Environment Notes: NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
wireguardtest_20240224
Processor: AMD Ryzen 7 5800X3D 8-Core @ 3.40GHz (8 Cores / 16 Threads), Motherboard: ASRock X570S PG Riptide (P2.20 BIOS), Chipset: AMD Starship/Matisse, Memory: 64GB, Disk: Western Digital WD_BLACK SN850X 2000GB, Graphics: Sapphire AMD Radeon RX 6700 XT, Audio: AMD Navi 21/23, Monitor: MSI MS321UP, Network: Realtek Killer E3000 2.5GbE
OS: ManjaroLinux 23.1.3, Kernel: 6.6.16-2-MANJARO (x86_64), Desktop: KDE Plasma 5.27.10, Display Server: X Server 1.21.1.11, OpenGL: 4.6 Mesa 23.3.5-manjaro1.1 (LLVM 16.0.6 DRM 3.54), Compiler: GCC 13.2.1 20230801 + Clang 16.0.6 + LLVM 16.0.6 + CUDA 12.3, File-System: ext4, Screen Resolution: 3840x2160
Kernel Notes: amdgpu.ppfeaturemask=0xffffffff - Transparent Huge Pages: always
Environment Notes: NVCC_PREPEND_FLAGS="-ccbin /opt/cuda/bin"
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa20120a
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 24 February 2024 04:53 by user fezo84.