kvm-boot1

hyperv

HTML result view exported from: https://openbenchmarking.org/result/2002035-HU-2002031HU04.

kvm-boot1ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkMonitorOSKernelCompilerFile-SystemScreen ResolutionSystem Layerkvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total1esxi-boot-totalhyperv-boot-total2 x Intel Core (Skylake IBRS) (2 Cores)QEMU Standard PC (i440FX + PIIX 1996) (1.10.2-1ubuntu1 BIOS)Intel 440FX 82441FX PMC2048MB30GBRed Hat QXL paravirtual graphic cardQEMU GenericRed Hat Virtio deviceUbuntu 18.044.15.0-76-generic (x86_64)GCC 7.4.0ext41024x768KVMIntel Xeon E3-1220 v5 @ 3.50GHz (4 Cores)Dell 0FRVY0 (2.4.3 BIOS)Intel Xeon E3-1200 v5/E3-15002 x 1000GB Seagate ST1000NM0085Matrox G200eR2B19-22 x Broadcom NetXtreme BCM5720 PCIebtrfs1280x1024lxc2 x Intel Xeon E3-1220 v5 (2 Cores)Xen HVM domU (4.11.1-7.2 BIOS)Intel 440FX 82441FX PMC20GBEFI VGAext4800x600Xen HVM domU 4.11.1-7.22 x Intel Xeon E3-1220 v5 (3 Cores)Intel 440BX (6.00 BIOS)Intel 440BX/ZX/DX34GB Virtual diskVMware SVGA IIVMware VMXNET31176x885VMwareIntel Xeon E3-1220 v5 (2 Cores)Microsoft Virtual Machine v7.0 (090007 BIOS)32GB Virtual DiskMicrosoft Hyper-V virtual VGA1152x864Microsoft Hyper-V ServerOpenBenchmarking.orgProcessor Details- kvm-boot-total: CPU Microcode: 0x1- ldx-boot-total: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6- xen-boot-total: CPU Microcode: 0xc6- xen-boot-total1: CPU Microcode: 0xc6- esxi-boot-total: CPU Microcode: 0xcc- hyperv-boot-total: CPU Microcode: 0xffffffffPython Details- Python 2.7.17 + Python 3.6.9Security Details- kvm-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - ldx-boot-total: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled - xen-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - xen-boot-total1: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown - esxi-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT Host state unknown - hyperv-boot-total: itlb_multihit: KVM: Vulnerable + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown

kvm-boot1systemd-boot-total: TotalDifferencekvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total1esxi-boot-totalhyperv-boot-total84611.59x79991.62x164401.21x164401.21x169441.19x208791.00xOpenBenchmarking.org

Systemd Total Boot Time

Test: Total

OpenBenchmarking.orgms, Fewer Is BetterSystemd Total Boot TimeTest: Totalkvm-boot-totalldx-boot-totalxen-boot-totalxen-boot-total1esxi-boot-totalhyperv-boot-total4K8K12K16K20K8461799916440164401694420879


Phoronix Test Suite v10.8.4