20191213-pts-himeno

Xen 4.11.2-pre Hypervisor testing on Debian 10 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/1912137-HV-20191213P01.

20191213-pts-himenoProcessorMemoryDiskOSKernelCompilerFile-SystemSystem LayerAMD Ryzen 5 2400GAMD Ryzen 5 2400G (6 Cores)5120MB73GBDebian 104.19.0-6-amd64 (x86_64)GCC 8.3.0 + LLVM 8.0.1jfsXen 4.11.2-pre HypervisorOpenBenchmarking.org- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling

20191213-pts-himenohimeno: Poisson Pressure SolverStandard ErrorStandard DeviationAMD Ryzen 5 2400G4110.8541.991.77%OpenBenchmarking.org

Himeno Benchmark

Poisson Pressure Solver

OpenBenchmarking.orgMFLOPS, More Is BetterHimeno Benchmark 3.0Poisson Pressure SolverAMD Ryzen 5 2400G9001800270036004500SE +/- 41.99, N = 34110.851. (CC) gcc options: -O3 -mavx2


Phoronix Test Suite v10.8.4