wireguardrun1
Intel Core i5-7400 testing with a Dell Vostro 3268 0Y2YM6 (1.3.4 BIOS) and Intel HD 630 on Debian 11 via the Phoronix Test Suite.
Realtek RTL8111
Processor: Intel Core i5-7400 @ 3.50GHz (4 Cores), Motherboard: Dell Vostro 3268 0Y2YM6 (1.3.4 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8GB, Disk: 256GB LITEON CV3-CE256 + 4001GB One Touch HDD, Graphics: Intel HD 630 (1000MHz), Audio: Realtek ALC891, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9565 / AR9565
OS: Debian 11, Kernel: 5.10.0-23-amd64 (x86_64), Desktop: GNOME Shell 3.38.6, Display Server: X Server, Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x5e
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
WireGuard + Linux Networking Stack Stress Test
This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.
Realtek RTL8111
Processor: Intel Core i5-7400 @ 3.50GHz (4 Cores), Motherboard: Dell Vostro 3268 0Y2YM6 (1.3.4 BIOS), Chipset: Intel Xeon E3-1200 v6/7th, Memory: 8GB, Disk: 256GB LITEON CV3-CE256 + 4001GB One Touch HDD, Graphics: Intel HD 630 (1000MHz), Audio: Realtek ALC891, Network: Realtek RTL8111/8168/8411 + Qualcomm Atheros QCA9565 / AR9565
OS: Debian 11, Kernel: 5.10.0-23-amd64 (x86_64), Desktop: GNOME Shell 3.38.6, Display Server: X Server, Vulkan: 1.0.2, Compiler: GCC 10.2.1 20210110, File-System: ext4
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate powersave (EPP: balance_performance) - CPU Microcode: 0x5e
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT disabled + retbleed: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected
Testing initiated at 11 March 2024 16:48 by user lselter.