From: "Randy G. Duran" <randy.g.duran(a)intel.com>
Add the kernel-iot-lts2019 bundle, it contains the standard version
of iot-lts2019 kernel.
Signed-off-by: Randy G. Duran <randy.g.duran(a)intel.com>
bundles/kernel-iot-lts2019 | 12 ++++++++++++
1 file changed, 12 insertions(+)
create mode 100644 bundles/kernel-iot-lts2019
diff --git a/bundles/kernel-iot-lts2019 b/bundles/kernel-iot-lts2019
new file mode 100644
@@ -0,0 +1,12 @@
+# [TITLE]: kernel-iot-lts2019
+# [DESCRIPTION]: Run the Intel "PK" kernel, an enterprise-style kernel with backports.
+# [STATUS]: Active
+# [TAGS]: Developer Tools, kernel
+# [MAINTAINER]: Duran, Randy G <randy.g.duran(a)intel.com>
I am a 13 yr old newbie to Linux
I was thinking if I can run it on the following, or if something is
Thanks a lot
Processor : Intel Core i7-8650U-processor (8 MB cache, 4,20 GHz
- Memory : 32 GB (16+16) DDR4 2 400 MHz SoDIMM
- Near Field Communication : Near Field Communication Enabled
- Pointing Device : finger print w NFC
- Security Chip : Hardware dTPM
- TPM Setting : dTPM2.0
- Wireless : Intel Dual Band Wireless-AC 8265 2x2 AC, Bluetooth
Version 4.1, vPro
- vPro Certified Model : vPro-certifierad
- Display Panel : 14,0-tums FHD (1 920 × 1 080), PPS, multitouch,
- WWAN, 2D-kamera, mikrofon
- Base : Intel UHD-grafik 620
Clear Linux systems which have updated to 28970 may no longer start
systemd-networkd automatically causing a loss in network connectivity for
wired network interfaces.
If you have a system experiencing this issue, run the following command to
resolve it and prevent it from happening in the future:
sudo systemctl enable systemd-networkd
- Clear Linux OS Team
This is a proposition that Clear Linux should set
CONFIG_SECURITY_DMESG_RESTRICT=y for all kernel configs. It's equivalent to
sysctl kernel.dmesg_restrict = 1, seen on
This config option makes it so that non-root users can't read dmesg.
clr@clr / $ dmesg
dmesg: read kernel buffer failed: Operation not permitted
As KSPP says, this helps us "Avoid kernel memory address exposures via dmesg."
For example, VirtualBox was leaking addresses to dmesg:
https://www.virtualbox.org/ticket/15167 which allows attackers to exploit
vulnerabilities they would have been otherwise been unable to, because attackers
need a vulnerability, AND an info leak (address disclosure) to make exploits
Turning on CONFIG_SECURITY_DMESG_RESTRICT would make it so attackers couldn't
get addresses from dmesg, should they happen to be leaked.
I'm trying to find manuals on how to setup an visualized os within a kata-container but I'm unable to find one.
is it possible to get a link for such manual? if there isn't one, can anyone summarize how to configure and run such instance?
System: Dell Latitude 5480
Description: In my case, selecting the Portuguese keyboard keymap results in still having all inputs behave as the default US keyboard. I picked PT during install and have since attempted to change it in the installed system in the following places:
Gnome Settings - Region and Language
None of these had any impact and the keymap is still being interpreted as US.
I have experienced this behavior in the past but fixing it involves installing further locale specific packages. Something I am unable or unaware of how to do in Clear Linux.
GitHub Username: Unaccounted4
Signed-off-by: Michael Vincerra <michael.vincerra(a)intel.com>
bundles/d-basic | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/bundles/d-basic b/bundles/d-basic
index f994fcb9..376637d6 100644
@@ -2,7 +2,7 @@
# [DESCRIPTION]: Build and run D language programs.
# [STATUS]: Active
# [CAPABILITIES]: Build and run D language programs
-# [TAGS]: ProgrammingLanguages
+# [TAGS]: Programming Languages
# [MAINTAINER]: William Douglas <william.douglas(a)intel.com>