It is required to monitor the real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration
Processor: 8 x Intel Core i9-9900 (16 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 215GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 18.04, Kernel: 5.4.0-150-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.8, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1718x920, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xf0
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
Processor: 8 x Intel Core i9-9900 (16 Cores), Motherboard: Intel 440BX (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 16GB, Disk: 215GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: Ubuntu 18.04, Kernel: 5.4.0-150-generic (x86_64), Desktop: GNOME Shell 3.28.4, Display Server: X Server 1.20.8, Compiler: GCC 7.5.0, File-System: ext4, Screen Resolution: 1718x920, System Layer: VMware
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: CPU Microcode: 0xf0
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Unknown: Dependent on hypervisor status + tsx_async_abort: Not affected
Testing initiated at 29 February 2024 11:31 by user vpatnala.