项目作者: keicodes

项目描述 :
Lean and simple performance oriented build of the Linux kernel :zap:
高级语言: Shell
项目地址: git://github.com/keicodes/iodine-kernel.git
创建时间: 2020-06-13T18:11:32Z
项目社区:https://github.com/keicodes/iodine-kernel

开源协议:

下载


:zap: Iodine Kernel

Lean and simple performance oriented build of the Linux kernel.

Every change aims to maintain - or, possibly, optimize - the power usage-to-performance ratio.

license: WTFPL

Features

  • Kernel compression mode LZ4
  • BMQ Process Scheduler
  • No I/O Scheduler (suited for better SSD performance)
  • Swap Pages LZ4/z3fold
  • Westwood+ TCP Congestion Control + FQ_CODEL Queue Scheduler
  • Disabled several hardening and debugging options
  • Low swappiness value
  • GCC optimization -O3, graysky2’s patch
  • LLVM/Clang build facility

Releases

Pre-built releases no more provided

Build

Optionally, before jumping to the actual build, you may wish to edit the iodine.sh to set your personal configs under Configurations.

To build a DEB package (you could omit —deb as it’s the default option), use:

  1. ./iodine.sh -gpc --deb --build

for a RPM package, use:

  1. ./iodine.sh -gpc --rpm --build

Append --generic to build a generic kernel.

Complete usage ./iodine.sh -h:

  1. -h, --help
  2. Print these options
  3. -g, --get-kernel
  4. Clone the Linux repository only
  5. -p, --apply-patches
  6. Apply patches only
  7. -c, --set-config
  8. Generate the kernel config with the selected options
  9. -b, --build
  10. Run over all the commands to build the kernel
  11. --llvm
  12. Use LLVM
  13. --deb, --rpm
  14. Package to either DEB or RPM
  15. --generic
  16. Optimize for generic x86_64 CPUs
  17. --sign-modules
  18. Signing facility

To sign the modules, proceed to update the option in the iodine.sh file to IODINE_SIGNING="y" and use IODINE_SIGNING_KEY to assign the signing key path.

Requirements

Since the kernel is compressed using LZ4, be sure to have it installed!

  1. $ sudo apt install lz4

For a faster, less safe, experience you could disable the security mitigations editing the GRUB default (/etc/default/grub), appending mitigations=off to the GRUB_CMDLINE_LINUX_DEFAULT option:

  1. GRUB_CMDLINE_LINUX_DEFAULT="quiet mitigations=off"