pi sdr
ARMv8 Cortex-A72 testing with a BCM2835 Raspberry Pi 400 Rev 1.0 and V3D 4.2 4GB on Debian 10 via the Phoronix Test Suite.
1
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
2
3
4
Processor: ARMv8 Cortex-A72 @ 1.80GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 400 Rev 1.0, Memory: 4096MB, Disk: 32GB GB1QT, Graphics: V3D 4.2 4GB, Monitor: DELL P2210H
OS: Debian 10, Kernel: 5.4.51-v8+ (aarch64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.4, OpenGL: 2.1 Mesa 19.3.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
LuaRadio
LuaRadio is a lightweight software-defined radio (SDR) framework built atop LuaJIT. LuaRadio provides a suite of source, sink, and processing blocks, with a simple API for defining flow graphs, running flow graphs, creating blocks, and creating data types. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 March 2021 13:58 by user pi.
2
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 March 2021 14:11 by user pi.
3
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 March 2021 14:25 by user pi.
4
Processor: ARMv8 Cortex-A72 @ 1.80GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 400 Rev 1.0, Memory: 4096MB, Disk: 32GB GB1QT, Graphics: V3D 4.2 4GB, Monitor: DELL P2210H
OS: Debian 10, Kernel: 5.4.51-v8+ (aarch64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.4, OpenGL: 2.1 Mesa 19.3.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 10 March 2021 14:44 by user pi.