To find individual public OpenBenchmarking.org results matching this component, use the integrated Google site search page.
processor : 0
vendor_id : AuthenticAMD
cpu family : 21
model : 56
model name : AMD A6-7470K Radeon R5, 6 Compute Cores 2C+4G
stepping : 1
microcode : 0x6003106
cpu MHz : 2256.663
cache size : 1024 KB
physical id : 0
siblings : 2
core id : 0
cpu cores : 1
apicid : 16
initial apicid : 0
fpu : yes
fpu_exception : yes
cpuid level : 13
wp : yes
flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 popcnt aes xsave avx f16c lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs xop skinit wdt lwp fma4 tce nodeid_msr tbm topoext perfctr_core perfctr_nb bpext ptsc cpb hw_pstate ssbd vmmcall fsgsbase bmi1 xsaveopt arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold overflow_recov
bugs : fxsave_leak sysret_ss_attrs null_seg spectre_v1 spectre_v2 spec_store_bypass
bogomips : 8799.29
TLB size : 1536 4K pages
clflush size : 64
cache_alignment : 64
address sizes : 48 bits physical, 48 bits virtual
power management: ts ttp tm 100mhzsteps hwpstate cpb eff_freq_ro [13]
Architektura: x86_64
Tryb(y) pracy CPU: 32-bit, 64-bit
Kolejność bajtów: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU: 2
Lista aktywnych CPU: 0,1
Wątków na rdzeń: 2
Rdzeni na gniazdo: 1
Gniazd: 1
Węzłów NUMA: 1
ID producenta: AuthenticAMD
Rodzina CPU: 21
Model: 56
Nazwa modelu: AMD A6-7470K Radeon R5, 6 Compute Cores 2C+4G
Wersja: 1
Frequency boost: enabled
CPU MHz: 2183.072
CPU max MHz: 4400,0000
CPU min MHz: 1400,0000
BogoMIPS: 8799.29
Wirtualizacja: AMD-V
Cache L1d: 16 KiB
Cache L1i: 96 KiB
Cache L2: 1 MiB
Procesory węzła NUMA 0: 0,1
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
Flagi: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni pclmulqdq monitor ssse3 fma cx16 sse4_1 sse4_2 popcnt aes xsave avx f16c lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs xop skinit wdt lwp fma4 tce nodeid_msr tbm topoext perfctr_core perfctr_nb bpext ptsc cpb hw_pstate ssbd vmmcall fsgsbase bmi1 xsaveopt arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter pfthreshold overflow_recov