kvm-boot1
xen
kvm-boot-total
Processor: 2 x Intel Core (Skylake IBRS) (2 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.10.2-1ubuntu1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 30GB, Graphics: Red Hat QXL paravirtual graphic card, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
ldx-boot-total
Processor: Intel Xeon E3-1220 v5 @ 3.50GHz (4 Cores), Motherboard: Dell 0FRVY0 (2.4.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2048MB, Disk: 2 x 1000GB Seagate ST1000NM0085, Graphics: Matrox G200eR2, Monitor: B19-2, Network: 2 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: btrfs, Screen Resolution: 1280x1024, System Layer: lxc
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled
xen-boot-total
Processor Notes: CPU Microcode: 0xc6
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
xen-boot-total1
Processor: 2 x Intel Xeon E3-1220 v5 (2 Cores), Motherboard: Xen HVM domU (4.11.1-7.2 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 20GB, Graphics: EFI VGA
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 800x600, System Layer: Xen HVM domU 4.11.1-7.2
Systemd Total Boot Time
This test uses systemd-analyze to report the entire boot time. Learn more via the OpenBenchmarking.org test page.
kvm-boot-total
Processor: 2 x Intel Core (Skylake IBRS) (2 Cores), Motherboard: QEMU Standard PC (i440FX + PIIX 1996) (1.10.2-1ubuntu1 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 30GB, Graphics: Red Hat QXL paravirtual graphic card, Audio: QEMU Generic, Network: Red Hat Virtio device
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 1024x768, System Layer: KVM
Processor Notes: CPU Microcode: 0x1
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 3 February 2020 14:30 by user test.
ldx-boot-total
Processor: Intel Xeon E3-1220 v5 @ 3.50GHz (4 Cores), Motherboard: Dell 0FRVY0 (2.4.3 BIOS), Chipset: Intel Xeon E3-1200 v5/E3-1500, Memory: 2048MB, Disk: 2 x 1000GB Seagate ST1000NM0085, Graphics: Matrox G200eR2, Monitor: B19-2, Network: 2 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: btrfs, Screen Resolution: 1280x1024, System Layer: lxc
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled
Testing initiated at 3 February 2020 14:32 by user dynamo.
xen-boot-total
Processor Notes: CPU Microcode: 0xc6
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 3 February 2020 15:47 by user test1.
xen-boot-total1
Processor: 2 x Intel Xeon E3-1220 v5 (2 Cores), Motherboard: Xen HVM domU (4.11.1-7.2 BIOS), Chipset: Intel 440FX 82441FX PMC, Memory: 2048MB, Disk: 20GB, Graphics: EFI VGA
OS: Ubuntu 18.04, Kernel: 4.15.0-76-generic (x86_64), Compiler: GCC 7.4.0, File-System: ext4, Screen Resolution: 800x600, System Layer: Xen HVM domU 4.11.1-7.2
Processor Notes: CPU Microcode: 0xc6
Python Notes: Python 2.7.17 + Python 3.6.9
Security Notes: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown
Testing initiated at 3 February 2020 15:48 by user test1.