boot1

boot patched

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1911085-AS-BOOT1149132
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
boot without
November 08 2019
  1 Minute
boot patched
November 08 2019
  1 Minute
Invert Hiding All Results Option
  1 Minute
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


boot1OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads)HP ProLiant DL360p Gen8 (P71 BIOS)Intel Xeon E7 v2/Xeon16 x 16384 MB DDR3-1600MT/s 713756-081300GB LOGICAL VOLUME + 1600GB LOGICAL VOLUMEMatrox MGA G200EH2 x Broadcom NetXtreme II BCM57810 10Debian 105.0.21-3-pve (x86_64)GCC 8.3.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionBoot1 BenchmarksSystem Logs- Scaling Governor: intel_pstate performance- Python 2.7.16 + Python 3.7.3- boot without: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling - boot patched: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling

boot without vs. boot patched ComparisonPhoronix Test SuiteBaseline+32.7%+32.7%+65.4%+65.4%+98.1%+98.1%130.7%107.7%34.1%UserspaceTotalKernelSystemd Total Boot TimeSystemd Total Boot TimeSystemd Total Boot Timeboot withoutboot patched

Systemd Total Boot Time

This test uses systemd-analyze to report the entire boot time. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgms, Fewer Is BetterSystemd Total Boot TimeTest: Totalboot withoutboot patched13K26K39K52K65K5904928429

OpenBenchmarking.orgms, Fewer Is BetterSystemd Total Boot TimeTest: Kernelboot withoutboot patched2K4K6K8K10K90866776

OpenBenchmarking.orgms, Fewer Is BetterSystemd Total Boot TimeTest: Userspaceboot withoutboot patched11K22K33K44K55K4996321653