test1
Intel Celeron J4105 testing with a ASRock J4105M (P1.30 BIOS) and Intel UHD 605 on CentOS Linux 8 via the Phoronix Test Suite.
Intel Celeron J4105
Processor: Intel Celeron J4105 @ 2.50GHz (4 Cores), Motherboard: ASRock J4105M (P1.30 BIOS), Chipset: Intel Gemini Lake, Memory: 16GB, Disk: 128GB SanDisk SD6SB1M + 80GB Western Digital WD800JD-22MS, Graphics: Intel UHD 605 (750MHz), Audio: Realtek ALC887-VD, Monitor: HP L1950, Network: Realtek RTL8111/8168/8411
OS: CentOS Linux 8, Kernel: 4.18.0-240.10.1.el8_3.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x34
Java Notes: OpenJDK Runtime Environment (build 1.8.0_275-b01)
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
DaCapo Benchmark
This test runs the DaCapo Benchmarks written in Java and intended to test system/CPU performance. Learn more via the OpenBenchmarking.org test page.
Intel Celeron J4105
Processor: Intel Celeron J4105 @ 2.50GHz (4 Cores), Motherboard: ASRock J4105M (P1.30 BIOS), Chipset: Intel Gemini Lake, Memory: 16GB, Disk: 128GB SanDisk SD6SB1M + 80GB Western Digital WD800JD-22MS, Graphics: Intel UHD 605 (750MHz), Audio: Realtek ALC887-VD, Monitor: HP L1950, Network: Realtek RTL8111/8168/8411
OS: CentOS Linux 8, Kernel: 4.18.0-240.10.1.el8_3.x86_64 (x86_64), File-System: xfs, Screen Resolution: 1280x1024
Kernel Notes: Transparent Huge Pages: always
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x34
Java Notes: OpenJDK Runtime Environment (build 1.8.0_275-b01)
Security Notes: SELinux + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Vulnerable + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 20 February 2021 11:03 by user .