VMware testing on openEuler 24.03 via the Phoronix Test Suite.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-openEuler-linux --disable-bootstrap --disable-libgcj --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-backtrace --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_64=x86-64-v2 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cloog --without-isl
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Processor: 4 x AMD Ryzen 7 8845HS (8 Cores), Motherboard: Intel VMware Virtual 440BX Desktop (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8 GB DRAM, Disk: 86GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: openEuler 24.03, Kernel: 6.6.0-28.0.0.34.oe2403.x86_64 (x86_64), Compiler: GCC 12.3.1, File-System: ext4, Screen Resolution: 1280x800, System Layer: VMware
This is a benchmark of Schbench, a Linux kernel scheduler benchmark developed by Facebook/Meta. Learn more via the OpenBenchmarking.org test page.
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-openEuler-linux --disable-bootstrap --disable-libgcj --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-backtrace --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_64=x86-64-v2 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cloog --without-isl
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 January 2025 10:25 by user .
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-openEuler-linux --disable-bootstrap --disable-libgcj --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-backtrace --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_64=x86-64-v2 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cloog --without-isl
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 January 2025 17:22 by user .
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-openEuler-linux --disable-bootstrap --disable-libgcj --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-backtrace --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_64=x86-64-v2 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cloog --without-isl
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 6 January 2025 21:26 by user .
Processor: 4 x AMD Ryzen 7 8845HS (8 Cores), Motherboard: Intel VMware Virtual 440BX Desktop (6.00 BIOS), Chipset: Intel 440BX/ZX/DX, Memory: 1 x 8 GB DRAM, Disk: 86GB VMware Virtual S, Graphics: VMware SVGA II, Audio: Ensoniq ES1371/ES1373, Network: Intel 82545EM
OS: openEuler 24.03, Kernel: 6.6.0-28.0.0.34.oe2403.x86_64 (x86_64), Compiler: GCC 12.3.1, File-System: ext4, Screen Resolution: 1280x800, System Layer: VMware
Kernel Notes: Transparent Huge Pages: always
Compiler Notes: --build=x86_64-openEuler-linux --disable-bootstrap --disable-libgcj --disable-libunwind-exceptions --disable-multilib --enable-__cxa_atexit --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,lto --enable-libstdcxx-backtrace --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_64=x86-64-v2 --with-gcc-major-version-only --with-linker-hash-style=gnu --with-tune=generic --without-cloog --without-isl
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines; IBPB: conditional; STIBP: disabled; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 January 2025 07:08 by user .