test.txt
2 x Intel Xeon X5690 testing with a Supermicro X8DTU (2.0c BIOS) and Matrox MGA G200eW WPCM450 on CentOS Linux 7 via the Phoronix Test Suite.
1
Processor: 2 x Intel Xeon X5690 @ 3.47GHz (12 Cores / 24 Threads), Motherboard: Supermicro X8DTU (2.0c BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 6 x 16384 MB 1333MHz Samsung M393B2G70BH0-CK0, Disk: 500GB Seagate ST9500530NS, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel 82576
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq conservative
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
1
Processor: 2 x Intel Xeon X5690 @ 3.47GHz (12 Cores / 24 Threads), Motherboard: Supermicro X8DTU (2.0c BIOS), Chipset: Intel 5520 I/O + ICH10R, Memory: 6 x 16384 MB 1333MHz Samsung M393B2G70BH0-CK0, Disk: 500GB Seagate ST9500530NS, Graphics: Matrox MGA G200eW WPCM450, Network: 2 x Intel 82576
OS: CentOS Linux 7, Kernel: 3.10.0-957.27.2.el7.x86_64 (x86_64), Compiler: GCC 4.8.5 20150623, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq conservative
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of Load fences __user pointer sanitization + spectre_v2: Vulnerable: Retpoline without IBPB
Testing initiated at 7 March 2020 18:16 by user root.