namd-EPYC-7443p
AMD EPYC 7443P 24-Core testing with a Supermicro H12SSL-i v1.01 (2.3 BIOS) and ASPEED on Ubuntu 20.04 via the Phoronix Test Suite.
namd-EPYC-7443p
Processor: AMD EPYC 7443P 24-Core @ 2.85GHz (24 Cores / 48 Threads), Motherboard: Supermicro H12SSL-i v1.01 (2.3 BIOS), Chipset: AMD Starship/Matisse, Memory: 256GB, Disk: 1000GB CT1000P5PSSD8, Graphics: ASPEED, Network: 2 x Broadcom NetXtreme BCM5720 2-port PCIe
OS: Ubuntu 20.04, Kernel: 5.4.0-110-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001143
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
namd-EPYC-7443p
Processor: AMD EPYC 7443P 24-Core @ 2.85GHz (24 Cores / 48 Threads), Motherboard: Supermicro H12SSL-i v1.01 (2.3 BIOS), Chipset: AMD Starship/Matisse, Memory: 256GB, Disk: 1000GB CT1000P5PSSD8, Graphics: ASPEED, Network: 2 x Broadcom NetXtreme BCM5720 2-port PCIe
OS: Ubuntu 20.04, Kernel: 5.4.0-110-generic (x86_64), Vulkan: 1.1.182, Compiler: GCC 9.4.0 + LLVM 10.0.0, File-System: ext4, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: acpi-cpufreq ondemand (Boost: Enabled) - CPU Microcode: 0xa001143
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 15 May 2022 02:23 by user ml01s.