456
456
456
Processor: 2 x Intel Xeon Gold 6226 @ 2.70GHz (24 Cores / 48 Threads), Motherboard: Advantech SKY-5240 (5.14 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 24 x 32 GB DDR4-2666MT/s Apacer AQD-D4U32R26-SM, Disk: 128GB SQF-SM8M4-128G-S + 128GB LITEON CV1-8B128, Graphics: llvmpipe 32GB, Network: 4 x Intel I350 + 2 x Intel X710 for 10GbE SFP+
OS: Red Hat Enterprise Linux 8.0, Kernel: 4.18.0-80.el8.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, OpenGL: 3.3 Mesa 18.3.1 (LLVM 7.0 256 bits), Compiler: GCC 8.2.1 20180905 + CUDA 10.2, File-System: xfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5000024
Security Notes: SELinux + l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling
Apache Benchmark
This is a test of ab, which is the Apache benchmark program, using the system's supplied Apache web server. Learn more via the OpenBenchmarking.org test page.
456
Processor: 2 x Intel Xeon Gold 6226 @ 2.70GHz (24 Cores / 48 Threads), Motherboard: Advantech SKY-5240 (5.14 BIOS), Chipset: Intel Sky Lake-E DMI3 Registers, Memory: 24 x 32 GB DDR4-2666MT/s Apacer AQD-D4U32R26-SM, Disk: 128GB SQF-SM8M4-128G-S + 128GB LITEON CV1-8B128, Graphics: llvmpipe 32GB, Network: 4 x Intel I350 + 2 x Intel X710 for 10GbE SFP+
OS: Red Hat Enterprise Linux 8.0, Kernel: 4.18.0-80.el8.x86_64 (x86_64), Desktop: GNOME Shell 3.28.3, Display Server: X Server 1.20.3, Display Driver: modesetting 1.20.3, OpenGL: 3.3 Mesa 18.3.1 (LLVM 7.0 256 bits), Compiler: GCC 8.2.1 20180905 + CUDA 10.2, File-System: xfs, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x5000024
Security Notes: SELinux + l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling
Testing initiated at 19 December 2019 22:07 by user root.