bootime1
bootime without
bootime without
Processor: 4 x Common KVM (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 30GB, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-66-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, System Layer: KVM
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Systemd Total Boot Time
This test uses systemd-analyze to report the entire boot time. Learn more via the OpenBenchmarking.org test page.
bootime without
Processor: 4 x Common KVM (8 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 1 x 8192 MB RAM QEMU, Disk: 30GB, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-66-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, System Layer: KVM
Python Notes: Python 2.7.15+ + Python 3.6.8
Security Notes: l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 8 November 2019 15:40 by user root.