wsl-go-benchmark
microsoft testing on Ubuntu 20.04 via the Phoronix Test Suite.
Windows 10 2004 19041.2640 WSL
Processor: Intel Core i7-7700HQ @ 2.81GHz (4 Cores / 8 Threads), Memory: 16GB, Disk: 117GB
OS: Ubuntu 20.04, Kernel: 4.4.0-19041-Microsoft (x86_64), Compiler: GCC 9.3.0, File-System: wslfs, System Layer: wsl
Processor Notes: CPU Microcode: 0xffffffff
Windows 10 2004 19041.2640 WSL2
Processor: Intel Core i7-7700HQ (4 Cores / 8 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 4.19.84-microsoft-standard (x86_64), Compiler: GCC 9.3.0, File-System: ext4, System Layer: microsoft
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Go Benchmarks
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
Windows 10 2004 19041.2640 WSL
Processor: Intel Core i7-7700HQ @ 2.81GHz (4 Cores / 8 Threads), Memory: 16GB, Disk: 117GB
OS: Ubuntu 20.04, Kernel: 4.4.0-19041-Microsoft (x86_64), Compiler: GCC 9.3.0, File-System: wslfs, System Layer: wsl
Processor Notes: CPU Microcode: 0xffffffff
Testing initiated at 19 May 2020 15:48 by user ops.
Windows 10 2004 19041.2640 WSL2
Processor: Intel Core i7-7700HQ (4 Cores / 8 Threads), Memory: 14GB, Disk: 2 x 275GB Virtual Disk
OS: Ubuntu 20.04, Kernel: 4.19.84-microsoft-standard (x86_64), Compiler: GCC 9.3.0, File-System: ext4, System Layer: microsoft
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: itlb_multihit: vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 19 May 2020 20:54 by user ops.