dell-rodinia
Intel HD 5000
Dell-Rodinia
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 0G9CNK (A16 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 2 x 8192 MB DDR3-1600MT/s Samsung M471B1G73EB0-YK0, Disk: 128GB SAMSUNG SSD PM87, Graphics: Intel HD 5500 (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1366x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x23
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Rodinia
Rodinia is a suite focused upon accelerating compute-intensive applications with accelerators. CUDA, OpenMP, and OpenCL parallel models are supported by the included applications. This profile utilizes the OpenCL and OpenMP test binaries at the moment. Learn more via the OpenBenchmarking.org test page.
Dell-Rodinia
Processor: Intel Core i5-5300U @ 2.90GHz (2 Cores / 4 Threads), Motherboard: Dell 0G9CNK (A16 BIOS), Chipset: Intel Broadwell-U-OPI, Memory: 2 x 8192 MB DDR3-1600MT/s Samsung M471B1G73EB0-YK0, Disk: 128GB SAMSUNG SSD PM87, Graphics: Intel HD 5500 (900MHz), Audio: Intel Broadwell-U Audio, Network: Intel I218-LM + Intel 7265
OS: Debian 10, Kernel: 4.19.0-6-amd64 (x86_64), Display Server: X Server 1.20.4, Display Driver: modesetting 1.20.4, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1366x768
Compiler Notes: --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x23
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + tsx_async_abort: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable
Testing initiated at 8 January 2020 20:48 by user root.