Difference between revisions of "X86/Yocto BSP/Release Notes/v1.2.0001"
From ESS-WIKI
(Add known issues) |
(→Known issues) |
||
Line 88: | Line 88: | ||
| To make the process less likely to be killed by the OOM killer, you can do the following. | | To make the process less likely to be killed by the OOM killer, you can do the following. | ||
# echo -15 > /proc/$PID/oom_adj | # echo -15 > /proc/$PID/oom_adj | ||
− | $PID is the process ID. You can set valid ranges for oom_adj from -16 to +15, and a setting of -17 exempts a process entirely from the OOM killer. The | + | $PID is the process ID. You can set valid ranges for oom_adj from -16 to +15, and a setting of -17 exempts a process entirely from the OOM killer. The following command exempts X from the OOM killer. |
# pgrep -f "/usr/bin/X" | while read PID; do echo -17 > /proc/$PID/oom_adj; done | # pgrep -f "/usr/bin/X" | while read PID; do echo -17 > /proc/$PID/oom_adj; done | ||
|} | |} |
Latest revision as of 02:41, 25 October 2022
Introduction
The BSP is based on Yocto Project-based BSP for Intel® Atom® Processors (Formerly Known as Elkhart Lake) on IoT Platforms of MR3 version. In particular, Yocto 3.1 (dunfell) with 5.15.21 LTS kernel are used. Although this BSP is an x86_64 distribution, it's also possible to run a 32-bit application since IA32 emulation feature is enabled in kernel.
Major packages version list
Package | Version |
---|---|
Linux Kernel | 5.15.21 |
GCC | 9.3.0 |
Systemd | 244.5 |
Chromium | 90.0.4430.93 |
Docker-ce | 19.03.8 |
SUSI | 4.2.23350 |
Qt5 | 5.14.2 |
Qt5 Creator | 4.13.1 |
Quick Start Guide
Please check this out.
Docker image for Build Environment
Please check this out.
How to create USB installer
Please check this out.
Install to Target Device
Please check this out.
Enable secure boot
Please check this out.
Revision History
Revision | Date | Description |
---|---|---|
1.2.0001 | 2022-09-02 | initial version for Elkhart Lake |
Known issues
Subject | Work Around |
---|---|
Wake On LAN is disabled by default. | To enable WoL, use the commands as follows.
# ethtool --change eno1 wol g # ethtool --change eno2 wol g The WoL setting will return to disabled after cold boot. |
To protect critical process from Linux out-of-memory (OOM) killer | To make the process less likely to be killed by the OOM killer, you can do the following.
# echo -15 > /proc/$PID/oom_adj $PID is the process ID. You can set valid ranges for oom_adj from -16 to +15, and a setting of -17 exempts a process entirely from the OOM killer. The following command exempts X from the OOM killer. # pgrep -f "/usr/bin/X" | while read PID; do echo -17 > /proc/$PID/oom_adj; done |