Namd-0323-1
2 x AMD EPYC 7763 64-Core testing with a AMD DAYTONA_X (RYM1001D BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
2 x AMD EPYC 7763 64-Core
Processor: 2 x AMD EPYC 7763 64-Core @ 2.45GHz (128 Cores / 256 Threads), Motherboard: AMD DAYTONA_X (RYM1001D BIOS), Chipset: AMD Starship/Matisse, Memory: 16 x 32 GB DDR4-3200MT/s 36ASF4G72PZ-3G2E2, Disk: 256GB Samsung SSD 860, Graphics: ASPEED, Network: 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-67-generic (x86_64), Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
2 x AMD EPYC 7763 64-Core
Processor: 2 x AMD EPYC 7763 64-Core @ 2.45GHz (128 Cores / 256 Threads), Motherboard: AMD DAYTONA_X (RYM1001D BIOS), Chipset: AMD Starship/Matisse, Memory: 16 x 32 GB DDR4-3200MT/s 36ASF4G72PZ-3G2E2, Disk: 256GB Samsung SSD 860, Graphics: ASPEED, Network: 2 x Mellanox MT27710
OS: Ubuntu 20.04, Kernel: 5.4.0-67-generic (x86_64), Compiler: GCC 10.2.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 March 2021 11:54 by user root.