kvm-boot1

xen

HTML result view exported from: https://openbenchmarking.org/result/2002034-HU-2002034DY65.

kvm-boot1ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkMonitorOSKernelCompilerFile-SystemScreen ResolutionSystem Layerkvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total12 x Intel Core (Skylake IBRS) (2 Cores)QEMU Standard PC (i440FX + PIIX 1996) (1.10.2-1ubuntu1 BIOS)Intel 440FX 82441FX PMC2048MB30GBRed Hat QXL paravirtual graphic cardQEMU GenericRed Hat Virtio deviceUbuntu 18.044.15.0-76-generic (x86_64)GCC 7.4.0ext41024x768KVMIntel Xeon E3-1220 v5 @ 3.50GHz (4 Cores)Dell 0FRVY0 (2.4.3 BIOS)Intel Xeon E3-1200 v5/E3-15002 x 1000GB Seagate ST1000NM0085Matrox G200eR2B19-22 x Broadcom NetXtreme BCM5720 PCIebtrfs1280x1024lxc2 x Intel Xeon E3-1220 v5 (2 Cores)Xen HVM domU (4.11.1-7.2 BIOS)Intel 440FX 82441FX PMC20GBEFI VGAext4800x600Xen HVM domU 4.11.1-7.2OpenBenchmarking.orgProcessor Details- kvm-boot-total: CPU Microcode: 0x1- ldx-boot-total: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6- xen-boot-total: CPU Microcode: 0xc6- xen-boot-total1: CPU Microcode: 0xc6Python Details- Python 2.7.17 + Python 3.6.9Security Details- kvm-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - ldx-boot-total: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled - xen-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - xen-boot-total1: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown

kvm-boot1systemd-boot-total: TotalDifferencekvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total184611.49x79991.51x164401.00x164401.00xOpenBenchmarking.org

Systemd Total Boot Time

Test: Total

OpenBenchmarking.orgms, Fewer Is BetterSystemd Total Boot TimeTest: Totalkvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total14K8K12K16K20K846179991644016440


Phoronix Test Suite v10.8.4