wsl testing on Ubuntu 22.04 via the Phoronix Test Suite.
Processor: AMD Ryzen 9 5900X 12-Core (12 Cores / 24 Threads), Memory: 32GB, Disk: 0GB Virtual Disk + 9GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 24GB
OS: Ubuntu 22.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.2 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0 + CUDA 12.6, File-System: ext4, Screen Resolution: 1920x1080, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. This version of the NAMD test profile uses CUDA GPU acceleration. Learn more via the OpenBenchmarking.org test page.
Processor: AMD Ryzen 9 5900X 12-Core (12 Cores / 24 Threads), Memory: 32GB, Disk: 0GB Virtual Disk + 9GB Virtual Disk + 1100GB Virtual Disk, Graphics: D3D12 24GB
OS: Ubuntu 22.04, Kernel: 5.15.153.1-microsoft-standard-WSL2 (x86_64), Display Server: Wayland, OpenGL: 4.2 Mesa 23.2.1-1ubuntu3.1~22.04.2, Vulkan: 1.3.255, Compiler: GCC 11.4.0 + CUDA 12.6, File-System: ext4, Screen Resolution: 1920x1080, System Layer: wsl
Kernel Notes: Transparent Huge Pages: always
Processor Notes: CPU Microcode: 0xffffffff
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 4 November 2024 11:05 by user sahaj.