Infopc
AMD C-60 APU testing with a Acer JE10-BZ (V1.11 BIOS) and AMD Radeon HD 6290 256MB on Arch Linux via the Phoronix Test Suite.
prueba
Processor: AMD C-60 APU @ 1.00GHz (2 Cores), Motherboard: Acer JE10-BZ (V1.11 BIOS), Chipset: AMD 14h Root Complex, Memory: 4096MB, Disk: 500GB Seagate ST9500325AS, Graphics: AMD Radeon HD 6290 256MB, Audio: AMD Wrestler HDMI Audio, Network: Qualcomm Atheros AR8152 v2.0 + Broadcom BCM4313 802.11bgn
OS: Arch Linux, Kernel: 5.6.11-arch1-1 (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x5000119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
prueba
Processor: AMD C-60 APU @ 1.00GHz (2 Cores), Motherboard: Acer JE10-BZ (V1.11 BIOS), Chipset: AMD 14h Root Complex, Memory: 4096MB, Disk: 500GB Seagate ST9500325AS, Graphics: AMD Radeon HD 6290 256MB, Audio: AMD Wrestler HDMI Audio, Network: Qualcomm Atheros AR8152 v2.0 + Broadcom BCM4313 802.11bgn
OS: Arch Linux, Kernel: 5.6.11-arch1-1 (x86_64), Compiler: GCC 9.3.0, File-System: ext4
Processor Notes: Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x5000119
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline STIBP: disabled RSB filling + tsx_async_abort: Not affected
Testing initiated at 14 May 2020 18:52 by user julian.