Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    LINUX    |    Torvalds farts & fans know what he ate    |    8,232 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 7,871 of 8,232    |
|    Maurice Kinal to Benny Pedersen    |
|    8k on 1080p but no boot penguins    |
|    05 Aug 23 16:33:59    |
      MSGID: 1:153/7001.61441 64ce79f7       TZUTC: +0000       CHRS: UTF-8 4       Hey Benny!               :r !lscpu       Architecture: aarch64       CPU op-mode(s): 32-bit, 64-bit       Byte Order: Little Endian       CPU(s): 8       On-line CPU(s) list: 0-7       Vendor ID: ARM       Model name: Cortex-A55       Model: 0       Thread(s) per core: 1       Core(s) per socket: 4       Socket(s): 1       Stepping: r2p0       CPU(s) scaling MHz: 23%       CPU max MHz: 1800.0000       CPU min MHz: 408.0000       BogoMIPS: 48.00       Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32       atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp       Model name: Cortex-A76       Model: 0       Thread(s) per core: 1       Core(s) per socket: 2       Socket(s): 2       Stepping: r4p0       CPU(s) scaling MHz: 18%       CPU max MHz: 2304.0000       CPU min MHz: 408.0000       BogoMIPS: 48.00       Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32       atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp       L1d cache: 384 KiB (8 instances)       L1i cache: 384 KiB (8 instances)       L2 cache: 2.5 MiB (8 instances)       L3 cache: 3 MiB (1 instance)       Vulnerability Itlb multihit: Not affected       Vulnerability L1tf: Not affected       Vulnerability Mds: Not affected       Vulnerability Meltdown: Not affected       Vulnerability Mmio stale data: Not affected       Vulnerability Retbleed: Not affected       Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled       via prctl       Vulnerability Spectre v1: Mitigation; __user pointer sanitization       Vulnerability Spectre v2: Vulnerable: Unprivileged eBPF enabled       Vulnerability Srbds: Not affected       Vulnerability Tsx async abort: Not affected               :r /proc/version       Linux version 5.10.160-rk35xx (armbian@next) (aarch64-linux-gnu-gcc (Ubuntu       11.3.0-1ubuntu1~22.04) 11.3.0, GNU ld (GNU Binutils for Ubuntu) 2.38) #1 SMP       Thu Jul 6 13:36:29 UTC 2023              I currently have armbian booting from the nvme but plan to upgrade it to LFS       once kv-6 becomes more doable. I do have a personalized chrootable system       which works great for now.              Life is good,       Maurice               o- o- -o -o o- -o -o -o       /) /) (\ (\ /) (\ (\ (\       ^^ ^^ ^^ ^^ ^^ ^^ ^^ ^^       ... Fidonet 8K - With eight you get eggrolls.       --- GNU bash, version 5.2.15(1)-release (aarch64-unknown-linux-gnu)        * Origin: One of us @ (1:153/7001.61441)       SEEN-BY: 1/123 15/0 18/200 90/1 105/81 106/201 114/709 123/131 129/305       SEEN-BY: 134/100 153/135 141 143 757 802 6809 7001 7715 154/10 218/700       SEEN-BY: 218/840 221/1 6 226/30 227/114 229/110 112 113 206 307 317       SEEN-BY: 229/400 426 428 452 470 550 616 664 700 266/512 280/464 282/1038       SEEN-BY: 291/111 292/854 301/1 317/3 320/219 322/757 335/364 341/66       SEEN-BY: 341/234 342/200 396/45 460/58 256 1124 5858 633/280 712/848       SEEN-BY: 5054/30 5058/104 5075/35       PATH: 153/7001 757 221/6 460/58 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca