microsoft testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: AMD EPYC 9V74 80-Core (64 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 1 GB + 59 GB + 68 GB, Disk: 32GB MSFT NVMe Accelerator v1.0, Graphics: hyperv_drmdrmfb, Network: Mellanox MT28800
OS: Ubuntu 22.04, Kernel: 6.5.0-1016-azure (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
Processor: AMD EPYC 9V74 80-Core (64 Cores), Motherboard: Microsoft Virtual Machine (Hyper-V UEFI v4.1 BIOS), Memory: 1 GB + 59 GB + 68 GB, Disk: 32GB MSFT NVMe Accelerator v1.0, Graphics: hyperv_drmdrmfb, Network: Mellanox MT28800
OS: Ubuntu 22.04, Kernel: 6.5.0-1016-azure (x86_64), File-System: ext4, Screen Resolution: 1024x768, System Layer: microsoft
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 7 March 2024 22:31 by user root.