CoreELEC (official): 22.0-Piers_nightly_20241220 (Amlogic-ne.aarch64) Machine model: Ugoos AM8 Pro CoreELEC dt-id: s5_s928x_ugoos_am8_8g Amlogic dt-id: s5_s928x_AM8-8g Linux version: 5.4.210 (docker@56960d55a30e) #1 Fri Dec 20 05:02:40 IST 20 24 Kodi compiled: 2024-12-20 04:58:30 +0100 CoreELEC:~ # lscpu Architecture: aarch64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 5 On-line CPU(s) list: 0-4 Vendor ID: ARM Model name: Cortex-A55 Model: 0 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Stepping: r2p0 CPU(s) scaling MHz: 100% CPU max MHz: 2016.0000 CPU min MHz: 100.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp Model name: - Model: 1 Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 1 Stepping: 0x4 CPU(s) scaling MHz: 100% CPU max MHz: 1896.0000 CPU min MHz: 100.0000 Vulnerabilities: Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Not affected Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; __user pointer sanitization Spectre v2: Mitigation; CSV2, BHB Srbds: Not affected Tsx async abort: Not affected Architecture: aarch64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 5 On-line CPU(s) list: 0-4 Vendor ID: ARM Model name: Cortex-A55 Model: 0 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Stepping: r2p0 CPU(s) scaling MHz: 100% CPU max MHz: 2016.0000 CPU min MHz: 100.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp Model name: - Model: 1 Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 1 Stepping: 0x4 CPU(s) scaling MHz: 100% CPU max MHz: 1896.0000 CPU min MHz: 100.0000 Vulnerabilities: Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Not affected Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; __user pointer sanitization Spectre v2: Mitigation; CSV2, BHB Srbds: Not affected Tsx async abort: Not affected