10100 more sdr
Intel Core i3-10100 testing with a Gigabyte B460M DS3H (F2 BIOS) and Gigabyte Intel UHD 630 3GB on Ubuntu 20.04 via the Phoronix Test Suite.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xcc
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
2
3
4
Processor: Intel Core i3-10100 @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte B460M DS3H (F2 BIOS), Chipset: Intel Device 9b63, Memory: 16GB, Disk: 500GB Western Digital WDS500G3X0C-00SJG0, Graphics: Gigabyte Intel UHD 630 3GB (1100MHz), Audio: Realtek ALC887-VD, Monitor: G237HL, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.9.0-050900rc7daily20201002-generic (x86_64) 20201001, Desktop: GNOME Shell 3.36.3, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
LuaRadio
LuaRadio is a lightweight software-defined radio (SDR) framework built atop LuaJIT. LuaRadio provides a suite of source, sink, and processing blocks, with a simple API for defining flow graphs, running flow graphs, creating blocks, and creating data types. Learn more via the OpenBenchmarking.org test page.
GNU Radio
GNU Radio is a free software development toolkit providing signal processing blocks to implement software-defined radios (SDR) and signal processing systems. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xcc
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 March 2021 06:54 by user phoronix.
2
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xcc
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 March 2021 08:19 by user phoronix.
3
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xcc
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 March 2021 09:08 by user phoronix.
4
Processor: Intel Core i3-10100 @ 4.30GHz (4 Cores / 8 Threads), Motherboard: Gigabyte B460M DS3H (F2 BIOS), Chipset: Intel Device 9b63, Memory: 16GB, Disk: 500GB Western Digital WDS500G3X0C-00SJG0, Graphics: Gigabyte Intel UHD 630 3GB (1100MHz), Audio: Realtek ALC887-VD, Monitor: G237HL, Network: Realtek RTL8111/8168/8411
OS: Ubuntu 20.04, Kernel: 5.9.0-050900rc7daily20201002-generic (x86_64) 20201001, Desktop: GNOME Shell 3.36.3, Display Server: X Server 1.20.8, OpenGL: 4.6 Mesa 20.0.8, Vulkan: 1.2.131, Compiler: GCC 9.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: Transparent Huge Pages: madvise
Processor Notes: Scaling Governor: intel_pstate powersave - CPU Microcode: 0xcc
Python Notes: Python 3.8.2
Security Notes: itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable IBPB: disabled STIBP: disabled + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 11 March 2021 10:21 by user phoronix.