namd-1
AMD EPYC 7F72 24-Core testing with a AIC AURIGA v01 (Aurw_1.00.2 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
AMD EPYC 7F72 24-Core
Processor: AMD EPYC 7F72 24-Core @ 3.20GHz (24 Cores / 48 Threads), Motherboard: AIC AURIGA v01 (Aurw_1.00.2 BIOS), Chipset: AMD Starship/Matisse, Memory: 252GB, Disk: 18 x 1024GB Samsung SSD 970 PRO 1TB + 2 x 960GB ATP NVMe M.2 2280 SSD, Graphics: ASPEED, Audio: AMD Starship/Matisse, Network: 2 x Broadcom BCM57416 NetXtreme-E Dual-Media 10G RDMA
OS: Ubuntu 20.04, Kernel: 5.4.0-51-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8301034
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
AMD EPYC 7F72 24-Core
Processor: AMD EPYC 7F72 24-Core @ 3.20GHz (24 Cores / 48 Threads), Motherboard: AIC AURIGA v01 (Aurw_1.00.2 BIOS), Chipset: AMD Starship/Matisse, Memory: 252GB, Disk: 18 x 1024GB Samsung SSD 970 PRO 1TB + 2 x 960GB ATP NVMe M.2 2280 SSD, Graphics: ASPEED, Audio: AMD Starship/Matisse, Network: 2 x Broadcom BCM57416 NetXtreme-E Dual-Media 10G RDMA
OS: Ubuntu 20.04, Kernel: 5.4.0-51-generic (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1024x768
Processor Notes: Scaling Governor: acpi-cpufreq ondemand - CPU Microcode: 0x8301034
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 16 October 2020 15:53 by user red.