go-json
2 x Intel Xeon X5470 testing with a ASUS DSBF-D (1009 BIOS) and eVGA NVIDIA GeForce GTX 960 2GB on Ubuntu 19.04 via the Phoronix Test Suite.
2 x Intel Xeon X5470
Processor: 2 x Intel Xeon X5470 @ 3.33GHz (8 Cores), Motherboard: ASUS DSBF-D (1009 BIOS), Chipset: Intel 5000P MCH, Memory: 32768MB, Disk: 500GB Samsung SSD 860, Graphics: eVGA NVIDIA GeForce GTX 960 2GB (1277/3505MHz), Audio: NVIDIA GM206 HD Audio, Monitor: HP ZR2440w, Network: 2 x Intel 80003ES2LAN
OS: Ubuntu 19.04, Kernel: 5.0.0-25-generic (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 8.3.0 + CUDA 10.0, File-System: ext4, Screen Resolution: 3840x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Go Benchmarks
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
2 x Intel Xeon X5470
Processor: 2 x Intel Xeon X5470 @ 3.33GHz (8 Cores), Motherboard: ASUS DSBF-D (1009 BIOS), Chipset: Intel 5000P MCH, Memory: 32768MB, Disk: 500GB Samsung SSD 860, Graphics: eVGA NVIDIA GeForce GTX 960 2GB (1277/3505MHz), Audio: NVIDIA GM206 HD Audio, Monitor: HP ZR2440w, Network: 2 x Intel 80003ES2LAN
OS: Ubuntu 19.04, Kernel: 5.0.0-25-generic (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.4, Display Driver: NVIDIA 430.40, OpenGL: 4.6.0, Compiler: GCC 8.3.0 + CUDA 10.0, File-System: ext4, Screen Resolution: 3840x1200
Processor Notes: Scaling Governor: acpi-cpufreq ondemand
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: EPT disabled + mds: Vulnerable: Clear buffers attempted no microcode; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 6 September 2019 00:10 by user alekz.