raid5_iotest
Docker testing on Alpine Linux v3.9 3.9.4 via the Phoronix Test Suite.
raid5_iotest
Processor: Intel Core i5-3570 @ 3.80GHz (4 Cores), Motherboard: ASUS P8Z68-M PRO (4002 BIOS), Memory: 32GB, Disk: 18002GB MR9260-8i + 6000GB MR9260-8i + 180GB INTEL SSDSC2CT18, Graphics: inteldrmfb (1150MHz), Monitor: ASUS VS239
OS: Alpine Linux v3.9 3.9.4, Kernel: 4.12.14-lp150.12.82-default (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1920x1080, System Layer: Docker
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-fixed-point --disable-libmpx --disable-libmudflap --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-cloog-backend --enable-default-pie --enable-default-ssp --enable-languages=c,c++,objc,fortran,ada --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Disk Notes: CFQ / attr2,inode64,noquota,relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
IOzone
The IOzone benchmark tests the hard disk drive / file-system performance. Learn more via the OpenBenchmarking.org test page.
raid5_iotest
Processor: Intel Core i5-3570 @ 3.80GHz (4 Cores), Motherboard: ASUS P8Z68-M PRO (4002 BIOS), Memory: 32GB, Disk: 18002GB MR9260-8i + 6000GB MR9260-8i + 180GB INTEL SSDSC2CT18, Graphics: inteldrmfb (1150MHz), Monitor: ASUS VS239
OS: Alpine Linux v3.9 3.9.4, Kernel: 4.12.14-lp150.12.82-default (x86_64), Compiler: GCC 8.3.0, File-System: xfs, Screen Resolution: 1920x1080, System Layer: Docker
Compiler Notes: --build=x86_64-alpine-linux-musl --disable-fixed-point --disable-libmpx --disable-libmudflap --disable-libsanitizer --disable-libssp --disable-libstdcxx-pch --disable-multilib --disable-nls --disable-symvers --disable-werror --enable-__cxa_atexit --enable-checking=release --enable-cloog-backend --enable-default-pie --enable-default-ssp --enable-languages=c,c++,objc,fortran,ada --enable-shared --enable-threads --enable-tls --host=x86_64-alpine-linux-musl --mandir=/usr/share/man --target=x86_64-alpine-linux-musl --with-linker-hash-style=gnu
Disk Notes: CFQ / attr2,inode64,noquota,relatime,rw
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x21
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Vulnerable + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 30 January 2020 01:18 by user .