test_dacapobench.log
Intel Atom E3845 testing with a Seco 0A36 (1.26 BIOS) and Intel Atom Z36xxx/Z37xxx & Display on sky_blue 1.0.0 via the Phoronix Test Suite.
Intel Atom E3845
Processor: Intel Atom E3845 @ 1.92GHz (4 Cores), Motherboard: Seco 0A36 (1.26 BIOS), Chipset: Intel Atom Z36xxx/Z37xxx, Memory: 2 x 2048 MB DDR3-1332MT/s Seco, Disk: 16GB MMC16G, Graphics: Intel Atom Z36xxx/Z37xxx & Display (792MHz), Audio: Intel Atom Z36xxx/Z37xxx, Monitor: VE247, Network: Intel I210
OS: sky_blue 1.0.0, Kernel: 5.4.69-yocto-standard (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x90a
Java Notes: OpenJDK Runtime Environment (build 1.8.0_272-internal-ga)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Not affected + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
DaCapo Benchmark
This test runs the DaCapo Benchmarks written in Java and intended to test system/CPU performance. Learn more via the OpenBenchmarking.org test page.
Intel Atom E3845
Processor: Intel Atom E3845 @ 1.92GHz (4 Cores), Motherboard: Seco 0A36 (1.26 BIOS), Chipset: Intel Atom Z36xxx/Z37xxx, Memory: 2 x 2048 MB DDR3-1332MT/s Seco, Disk: 16GB MMC16G, Graphics: Intel Atom Z36xxx/Z37xxx & Display (792MHz), Audio: Intel Atom Z36xxx/Z37xxx, Monitor: VE247, Network: Intel I210
OS: sky_blue 1.0.0, Kernel: 5.4.69-yocto-standard (x86_64), Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0x90a
Java Notes: OpenJDK Runtime Environment (build 1.8.0_272-internal-ga)
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Vulnerable; SMT vulnerable + meltdown: Vulnerable + spec_store_bypass: Not affected + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 28 December 2020 17:01 by user root.