acerspire7741g-i7m640-8-ssd-memory-3006191224
Intel Core i7 640M testing with a Acer JE70_CP (V1.26 BIOS) and AMD Mobility Radeon HD 5650/5750 / 6530M/6550M 1GB on Arch Linux via the Phoronix Test Suite.
acerspire7741g-i7m640-8-ssd-memory-3006191224
Processor: Intel Core i7 640M @ 2.80GHz (2 Cores / 4 Threads), Motherboard: Acer JE70_CP (V1.26 BIOS), Chipset: Intel Core DRAM, Memory: 8192MB, Disk: 256GB ADATA SU800 + 1000GB TOSHIBA HDWJ110, Graphics: AMD Mobility Radeon HD 5650/5750 / 6530M/6550M 1GB, Audio: Realtek ALC272X, Network: Broadcom NetLink BCM57780 PCIe + Intel 7260
OS: Arch Linux, Kernel: 5.1.15-arch1-1-ARCH (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 3.3 Mesa 19.1.1 (LLVM 8.0.0), Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1600x900
Environment Notes: NVM_CD_FLAGS=-q
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Tinymembench
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
CacheBench
This is a performance test of CacheBench, which is part of LLCbench. CacheBench is designed to test the memory and cache bandwidth performance Learn more via the OpenBenchmarking.org test page.
RAMspeed SMP
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
MBW
This is a basic/simple memory (RAM) bandwidth benchmark for memory copy operations. Learn more via the OpenBenchmarking.org test page.
Stream
This benchmark tests the system memory (RAM) performance. Learn more via the OpenBenchmarking.org test page.
acerspire7741g-i7m640-8-ssd-memory-3006191224
Processor: Intel Core i7 640M @ 2.80GHz (2 Cores / 4 Threads), Motherboard: Acer JE70_CP (V1.26 BIOS), Chipset: Intel Core DRAM, Memory: 8192MB, Disk: 256GB ADATA SU800 + 1000GB TOSHIBA HDWJ110, Graphics: AMD Mobility Radeon HD 5650/5750 / 6530M/6550M 1GB, Audio: Realtek ALC272X, Network: Broadcom NetLink BCM57780 PCIe + Intel 7260
OS: Arch Linux, Kernel: 5.1.15-arch1-1-ARCH (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.5, Display Driver: modesetting 1.20.5, OpenGL: 3.3 Mesa 19.1.1 (LLVM 8.0.0), Compiler: GCC 9.1.0, File-System: ext4, Screen Resolution: 1600x900
Environment Notes: NVM_CD_FLAGS=-q
Compiler Notes: --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu
Processor Notes: Scaling Governor: acpi-cpufreq schedutil
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling
Testing initiated at 30 June 2019 12:25 by user human.