Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 1911085-AS-BOOT1149132
{
"title": "boot1",
"last_modified": "2019-11-08 17:52:17",
"description": "boot patched",
"systems": {
"boot without": {
"identifier": "boot without",
"hardware": {
"Processor": "2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores \/ 40 Threads)",
"Motherboard": "HP ProLiant DL360p Gen8 (P71 BIOS)",
"Chipset": "Intel Xeon E7 v2\/Xeon",
"Memory": "16 x 16384 MB DDR3-1600MT\/s 713756-081",
"Disk": "300GB LOGICAL VOLUME + 1600GB LOGICAL VOLUME",
"Graphics": "Matrox MGA G200EH",
"Network": "2 x Broadcom NetXtreme II BCM57810 10"
},
"software": {
"OS": "Debian 10",
"Kernel": "5.0.21-3-pve (x86_64)",
"Compiler": "GCC 8.3.0",
"File-System": "ext4",
"Screen Resolution": "1024x768"
},
"user": "root",
"timestamp": "2019-11-08 13:37:49",
"data": {
"cpu-scaling-governor": "intel_pstate performance",
"python": "Python 2.7.16 + Python 3.7.3",
"security": "l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy\/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling"
}
},
"boot patched": {
"identifier": "boot patched",
"hardware": {
"Processor": "2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores \/ 40 Threads)",
"Motherboard": "HP ProLiant DL360p Gen8 (P71 BIOS)",
"Chipset": "Intel Xeon E7 v2\/Xeon",
"Memory": "16 x 16384 MB DDR3-1600MT\/s 713756-081",
"Disk": "300GB LOGICAL VOLUME + 1600GB LOGICAL VOLUME",
"Graphics": "Matrox MGA G200EH",
"Network": "2 x Broadcom NetXtreme II BCM57810 10"
},
"software": {
"OS": "Debian 10",
"Kernel": "5.0.21-3-pve (x86_64)",
"Compiler": "GCC 8.3.0",
"File-System": "ext4",
"Screen Resolution": "1024x768"
},
"user": "root",
"timestamp": "2019-11-08 17:51:20",
"data": {
"cpu-scaling-governor": "intel_pstate performance",
"python": "Python 2.7.16 + Python 3.7.3",
"security": "l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy\/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling"
}
}
},
"results": {
"5d4714c55fad3f0b37f7cd5fd9c799327aea1f52": {
"identifier": "pts\/systemd-boot-total-1.0.5",
"title": "Systemd Total Boot Time",
"arguments": "total",
"description": "Test: Total",
"scale": "ms",
"proportion": "LIB",
"display_format": "BAR_GRAPH",
"results": {
"boot without": {
"value": 59049,
"test_run_times": [
0.179999999999999993338661852249060757458209991455078125
]
},
"boot patched": {
"value": 28429,
"test_run_times": [
0.059999999999999997779553950749686919152736663818359375
]
}
}
},
"a9feeff7930dd249dab1fbbaf5c74e4e61d3eb38": {
"identifier": "pts\/systemd-boot-total-1.0.5",
"title": "Systemd Total Boot Time",
"arguments": "kernel",
"description": "Test: Kernel",
"scale": "ms",
"proportion": "LIB",
"display_format": "BAR_GRAPH",
"results": {
"boot without": {
"value": 9086,
"test_run_times": [
0.070000000000000006661338147750939242541790008544921875
]
},
"boot patched": {
"value": 6776,
"test_run_times": [
0.0299999999999999988897769753748434595763683319091796875
]
}
}
},
"69d4b33557226611e659e37f880af232f3e8d5ef": {
"identifier": "pts\/systemd-boot-total-1.0.5",
"title": "Systemd Total Boot Time",
"arguments": "userspace",
"description": "Test: Userspace",
"scale": "ms",
"proportion": "LIB",
"display_format": "BAR_GRAPH",
"results": {
"boot without": {
"value": 49963,
"test_run_times": [
0.05000000000000000277555756156289135105907917022705078125
]
},
"boot patched": {
"value": 21653,
"test_run_times": [
0.070000000000000006661338147750939242541790008544921875
]
}
}
}
}
}