Rodinia test on Debian 9.9 with Vbox
OpenMPI test
Debian 9.9
Processor: AMD Ryzen 3 2200G (4 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: + ICH7-M, Memory: 2048MB, Disk: 69GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Debian 9.9, Kernel: 4.20.12 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic -v
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
LFS 8.4
Processor: AMD Ryzen 3 2200G (4 Cores), Motherboard: Oracle VirtualBox v1.2, Memory: 2048MB, Disk: 69GB VBOX HDD
OS: Linux From Scratch 8.4, Kernel: 4.20.12 (x86_64), Compiler: GCC 8.2.0, File-System: ext4, System Layer: VirtualBox
Compiler Notes: --disable-bootstrap --disable-libmpx --disable-multilib --enable-languages=c,c++
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes the OpenCL and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
Debian 9.9
Processor: AMD Ryzen 3 2200G (4 Cores), Motherboard: Oracle VirtualBox v1.2, Chipset: + ICH7-M, Memory: 2048MB, Disk: 69GB VBOX HDD, Graphics: VMware SVGA II, Audio: Intel 82801AA AC 97 Audio, Network: Intel 82540EM
OS: Debian 9.9, Kernel: 4.20.12 (x86_64), Compiler: GCC 6.3.0 20170516, File-System: ext4, Screen Resolution: 2048x2048, System Layer: Oracle VMware
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-vtable-verify --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic -v
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 9 August 2019 23:28 by user root.
LFS 8.4
Processor: AMD Ryzen 3 2200G (4 Cores), Motherboard: Oracle VirtualBox v1.2, Memory: 2048MB, Disk: 69GB VBOX HDD
OS: Linux From Scratch 8.4, Kernel: 4.20.12 (x86_64), Compiler: GCC 8.2.0, File-System: ext4, System Layer: VirtualBox
Compiler Notes: --disable-bootstrap --disable-libmpx --disable-multilib --enable-languages=c,c++
Security Notes: l1tf: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 10 August 2019 03:35 by user root.