Subj : orange pi 5
To : Benny Pedersen
From : Maurice Kinal
Date : Thu Jun 22 2023 03:22 pm
Hey Benny!
:r /proc/version
Linux version 5.10.110 (root@firefly-rk3399) (gcc (GCC) 13.1.0, GNU ld version 2.40-slack151) #1 SMP Sun Jun 18 14:32:57 EEST 2023
It needs work but I managed to boot it from a micro-SD. I plan to try installing from there to the nvme.
This might be of interest;
:r !lscpu
Architecture: aarch64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
CPU(s): 8
On-line CPU(s) list: 0-7
Vendor ID: ARM
Model name: Cortex-A55
Model: 0
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 1
Stepping: r2p0
CPU(s) scaling MHz: 100%
CPU max MHz: 1800.0000
CPU min MHz: 408.0000
BogoMIPS: 48.00
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp
Model name: Cortex-A76
Model: 0
Thread(s) per core: 1
Core(s) per socket: 2
Socket(s): 2
Stepping: r4p0
CPU(s) scaling MHz: 17%
CPU max MHz: 2400.0000
CPU min MHz: 408.0000
BogoMIPS: 48.00
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp
L1d cache: 384 KiB (8 instances)
L1i cache: 384 KiB (8 instances)
L2 cache: 2.5 MiB (8 instances)
L3 cache: 3 MiB (1 instance)
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
Vulnerability Spectre v2: Vulnerable: Unprivileged eBPF enabled
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Life is good,
Maurice
o- o- -o o- o- o- -o o-
/) /) (\ /) /) /) (\ /)
^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^
... Fidonet 8K - With eight you get eggrolls.
--- GNU bash, version 5.2.15(1)-release (aarch64-slackware-linux-gnu)
* Origin: One of us @ (1:153/7001.43690)