Ryzen 7 5800X - pts/namd
AMD Ryzen 7 5800X 8-Core testing with a ASUS TUF B450M-PRO GAMING (2409 BIOS) and Sapphire AMD Radeon RX 6700 XT 12GB on Debian via the Phoronix Test Suite.
AMD Ryzen 7 5800X 8-Core
Processor: AMD Ryzen 7 5800X 8-Core @ 4.85GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF B450M-PRO GAMING (2409 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 240GB KINGSTON SA400S3 + 120GB KINGSTON SUV5001 + 1000GB Seagate ST1000LM024 HN-M + 1000GB SAMSUNG HD103SJ + 240GB KINGSTON SHFS37A + 500GB HGST HTS545050A7, Graphics: Sapphire AMD Radeon RX 6700 XT 12GB (2725/1000MHz), Audio: AMD Navi 21/23, Monitor: S24F350, Network: Realtek RTL8111/8168/8411
OS: Debian, Kernel: 6.4.13-gajdusek (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, Display Driver: radeon, OpenGL: 4.6 Mesa 23.1.7-1 (LLVM 15.0.7 DRM 3.52), OpenCL: OpenCL 1.1 Mesa 22.2.0 + OpenCL 3.0 PoCL 4.0+debian Linux +Asserts RELOC SPIR LLVM 15.0.7 SLEEF DISTRO POCL_DEBUG, Compiler: GCC 13.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0x0
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
NAMD
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems. NAMD was developed by the Theoretical and Computational Biophysics Group in the Beckman Institute for Advanced Science and Technology at the University of Illinois at Urbana-Champaign. Learn more via the OpenBenchmarking.org test page.
AMD Ryzen 7 5800X 8-Core
Processor: AMD Ryzen 7 5800X 8-Core @ 4.85GHz (8 Cores / 16 Threads), Motherboard: ASUS TUF B450M-PRO GAMING (2409 BIOS), Chipset: AMD Starship/Matisse, Memory: 32GB, Disk: 240GB KINGSTON SA400S3 + 120GB KINGSTON SUV5001 + 1000GB Seagate ST1000LM024 HN-M + 1000GB SAMSUNG HD103SJ + 240GB KINGSTON SHFS37A + 500GB HGST HTS545050A7, Graphics: Sapphire AMD Radeon RX 6700 XT 12GB (2725/1000MHz), Audio: AMD Navi 21/23, Monitor: S24F350, Network: Realtek RTL8111/8168/8411
OS: Debian, Kernel: 6.4.13-gajdusek (x86_64), Desktop: Xfce 4.18, Display Server: X Server 1.21.1.8, Display Driver: radeon, OpenGL: 4.6 Mesa 23.1.7-1 (LLVM 15.0.7 DRM 3.52), OpenCL: OpenCL 1.1 Mesa 22.2.0 + OpenCL 3.0 PoCL 4.0+debian Linux +Asserts RELOC SPIR LLVM 15.0.7 SLEEF DISTRO POCL_DEBUG, Compiler: GCC 13.2.0 + Clang 14.0.6 + LLVM 14.0.6, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: always
Environment Notes: NVM_CD_FLAGS=
Processor Notes: Scaling Governor: amd-pstate performance (Boost: Enabled) - CPU Microcode: 0x0
Security Notes: gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 21 September 2023 22:07 by user pga.