Subj : orange pi 5 To : Benny Pedersen From : Maurice Kinal Date : Thu Jun 22 2023 15:22:30 Hey Benny! :r /proc/version Linux version 5.10.110 (root@firefly-rk3399) (gcc (GCC) 13.1.0, GNU ld version 2.40-slack151) #1 SMP Sun Jun 18 14:32:57 EEST 2023 It needs work but I managed to boot it from a micro-SD. I plan to try installing from there to the nvme. This might be of interest; :r !lscpu Architecture: aarch64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0-7 Vendor ID: ARM Model name: Cortex-A55 Model: 0 Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 Stepping: r2p0 CPU(s) scaling MHz: 100% CPU max MHz: 1800.0000 CPU min MHz: 408.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp Model name: Cortex-A76 Model: 0 Thread(s) per core: 1 Core(s) per socket: 2 Socket(s): 2 Stepping: r4p0 CPU(s) scaling MHz: 17% CPU max MHz: 2400.0000 CPU min MHz: 408.0000 BogoMIPS: 48.00 Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp L1d cache: 384 KiB (8 instances) L1i cache: 384 KiB (8 instances) L2 cache: 2.5 MiB (8 instances) L3 cache: 3 MiB (1 instance) Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Not affected Vulnerability Mds: Not affected Vulnerability Meltdown: Not affected Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Vulnerability Spectre v1: Mitigation; __user pointer sanitization Vulnerability Spectre v2: Vulnerable: Unprivileged eBPF enabled Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected Life is good, Maurice o- o- -o o- o- o- -o o- /) /) (\ /) /) /) (\ /) ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^ .... Fidonet 8K - With eight you get eggrolls. --- GNU bash, version 5.2.15(1)-release (aarch64-slackware-linux-gnu) * Origin: One of us @ (1:153/7001.43690) .