result

KVM testing on CentOS Linux 8 via the Phoronix Test Suite.

HTML result view exported from: https://openbenchmarking.org/result/2010243-FI-RESULT34525.

resultProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionSystem Layer4 x AMD EPYC4 x AMD EPYC (with IBPB) (4 Cores)QEMU Standard PC (Q35 + ICH9 2009) (1.13.0-2.fc32 BIOS)Intel 82G33/G31/P35/P31 + ICH91 x 8 GB RAM QEMU495GBRed Hat QXL paravirtual graphic cardRed Hat Virtio deviceCentOS Linux 84.18.0-193.19.1.el8_2.x86_64 (x86_64)GCC 8.3.1 20191121xfs1024x768KVMOpenBenchmarking.org- --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - CPU Microcode: 0x1000065- SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

resulthimeno: Poisson Pressure SolverStandard ErrorStandard Deviation4 x AMD EPYC3810.63327260.192.74%OpenBenchmarking.org

Himeno Benchmark

Poisson Pressure Solver

OpenBenchmarking.orgMFLOPS, More Is BetterHimeno Benchmark 3.0Poisson Pressure Solver4 x AMD EPYC8001600240032004000SE +/- 60.19, N = 33810.631. (CC) gcc options: -O3 -mavx2


Phoronix Test Suite v10.8.4