golang pts/go-benchmark
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PROTO=tcp SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_HOST=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_ADDR=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT_HTTP_SERVER=80
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Processor: 2 x Intel Xeon (16 Cores / 32 Threads), Motherboard: Google Compute Engine, Memory: 128GB, Disk: 107GB PersistentDisk
OS: Ubuntu 20.04, Kernel: 6.1.75+ (x86_64), Display Server: X Server, Compiler: GCC 9.4.0, File-System: overlayfs, System Layer: docker
Benchmark for monitoring real time performance of the Go implementation for HTTP, JSON and garbage testing per iteration. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PROTO=tcp SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_HOST=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_ADDR=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT_HTTP_SERVER=80
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 22 August 2024 12:02 by user root.
Processor: 2 x Intel Xeon (16 Cores / 32 Threads), Motherboard: Google Compute Engine, Memory: 128GB, Disk: 107GB PersistentDisk
OS: Ubuntu 20.04, Kernel: 6.1.75+ (x86_64), Display Server: X Server, Compiler: GCC 9.4.0, File-System: overlayfs, System Layer: docker
Kernel Notes: Transparent Huge Pages: madvise
Environment Notes: SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_PROTO=tcp SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_HOST=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT=tcp://100.122.71.207:80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT=80 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_PORT_80_TCP_ADDR=100.122.71.207 SUPPLYDEBUGGER_SERVER_83FC3A6B_18F1_SERVICE_PORT_HTTP_SERVER=80
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Not affected + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 22 August 2024 12:10 by user root.