Debian 9935 Published by

A new XanMod Linux Kernel based on Linux Kernel 5.15.57 has been released. XanMod is a general-purpose Linux kernel distribution with custom settings and new features. The real-time version is recommended for critical runtime applications such as Linux gaming eSports, streaming, live productions and ultra-low latency enthusiasts.



XanMod is a general-purpose Linux kernel distribution with custom settings and new features. Built to provide a stable, responsive and smooth desktop experience.

The real-time version is recommended for critical runtime applications such as Linux gaming eSports, streaming, live productions and ultra-low latency enthusiasts.

Supports all recent 64-bit versions of Debian and Ubuntu-based systems.

Main Features

  • Preemptive Full Tickless Kernel at 500Hz w/ Tuned CPU Core Scheduler.
  • RCU Boost for better responsiveness and lower overall system latency.
  • Block Layer w/ multi-threaded runqueue for high I/O throughput.
  • Caching, Virtual Memory Manager and CPUFreq Governor improvements.
  • BBR TCP Congestion Control + FQ-PIE Packet Scheduling and AQM Algorithm [5.8].
  • ORC Unwinder for Kernel Stack Traces (debuginfo) implementation.
  • Third-party patchset available: ZSTD kernel, initrd and modules support [5.8][5.6-rt], Full x86_64 FSGSBASE instructions [5.8], Clear Linux [partial], CK's Hrtimer Patchset [5.8][5.4], Wine / Proton Fsync, PCIe ACS Override, BMQ Process Scheduler [5.4 stock disabled], Aufs [5.4] and GCC graysky's.
  • Real-time Linux kernel (PREEMPT_RT) build available [5.6-rt][5.4-rt].
  • Generic kernel package for compatibility with most Debian & Ubuntu based distributions. Built on the latest GCC 10.2 and Binutils 2.35.
  • GPLv2 license. Can be built for any distribution or purpose.

Install via Terminal

echo 'deb  http://deb.xanmod.org releases main' | sudo tee /etc/apt/sources.list.d/xanmod-kernel.list && wget -qO -  https://dl.xanmod.org/gpg.key | sudo apt-key add -

Then update and install:

sudo apt update && sudo apt install linux-xanmod

Reboot.

Meta packages available: linux-xanmodlinux-xanmod-edgelinux-xanmod-ltslinux-xanmod-rt-edge and linux-xanmod-rt.

To try without adding the repository

Download from Sourceforge and install:
https://sourceforge.net/projects/xanmod/files/

  1. In terminal:
    sudo dpkg -i linux-image-*xanmod*.deb linux-headers-*xanmod*.deb
  2. Reboot.
  • Check it:
    cat /proc/version
* linux-firmware-image package is optional

Linux 5.15.57-xanmod1

5711c19 Linux 5.15.57-xanmod1
301bb0f x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag [v5.15.57+]
05f79c8 Merge tag 'v5.15.57' into 5.15
cc407be Revert "x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag"
a9e2d8e Linux 5.15.57
b4296a7 x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds
06741ef um: Add missing apply_returns()
320fc99 x86/bugs: Remove apostrophe typo
ac8edad tools headers cpufeatures: Sync with the kernel sources
1dd6c13 tools arch x86: Sync the msr-index.h copy with the kernel sources
5f4e77c KVM: emulate: do not adjust size of fastop and setcc subroutines
198685e x86/kvm: fix FASTOP_SIZE when return thunks are enabled
554cf28 efi/x86: use naked RET on mixed mode call wrapper
d0caa86 x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
67040d1 x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
96907c5 x86/xen: Fix initialisation in hypercall_page after rethunk
86ccf19 x86/static_call: Serialize __static_call_fixup() properly
73ad137 x86/speculation: Disable RRSBA behavior
db0128b x86/kexec: Disable RET on kexec
3653093 x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
925340f x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
2f8967e x86/bugs: Add Cannon lake to RETBleed affected CPU list
cc3011c x86/retbleed: Add fine grained Kconfig knobs
12a1357 x86/cpu/amd: Enumerate BTC_NO
d7a5c08 x86/common: Stamp out the stepping madness
8d5cff4 x86/speculation: Fill RSB on vmexit for IBRS
4207d7b KVM: VMX: Fix IBRS handling after vmexit
0cbd590 KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
5fde252 KVM: VMX: Convert launched argument to flags
852fe53 KVM: VMX: Flatten _vmx_vcpu_run()
c590fa2 objtool: Re-add UNWIND_HINT{SAVE_RESTORE}
66b37dc x86/speculation: Remove x86_spec_ctrl_mask
b55663e x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
2069bd0 x86/speculation: Fix SPEC_CTRL write on SMT state change
e898e28 x86/speculation: Fix firmware entry SPEC_CTRL handling
d427c1f x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
75d4fc2 x86/cpu/amd: Add Spectral Chicken
dab72c3 objtool: Add entry UNRET validation
469d9b1 x86/bugs: Do IBPB fallback check only once
fd17a42 x86/bugs: Add retbleed=ibpb
8894f69 x86/xen: Add UNTRAIN_RET
87e6270 x86/xen: Rename SYS* entry points
e894b78 objtool: Update Retpoline validation
a1d912d intel_idle: Disable IBRS during long idle
e51769d x86/bugs: Report Intel retbleed vulnerability
b934980 x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
347d0bf x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
e03415e x86/bugs: Optimize SPEC_CTRL MSR writes
62b4db5 x86/entry: Add kernel IBRS implementation
fac1b00 x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
b4e05ea x86/bugs: Enable STIBP for JMP2RET
89eba42 x86/bugs: Add AMD retbleed= boot parameter
82e92fe x86/bugs: Report AMD retbleed vulnerability
a9c0926 x86: Add magic AMD return-thunk
07f5c5e objtool: Treat .text.__x86.* as noinstr
1f068f9 x86/entry: Avoid very early RET
1d61a29 x86: Use return-thunk in asm code
6c45176 x86/sev: Avoid using __x86_return_thunk
f3d9f99 x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
5b43965 x86/kvm: Fix SETcc emulation for return thunks
0bfe8be x86/bpf: Use alternative RET encoding
e54fcb0 x86/ftrace: Use alternative RET encoding
c1c80aa x86,static_call: Use alternative RET encoding
b0fb978 objtool: skip non-text sections when adding return-thunk sites
1920e4b x86,objtool: Create .return_sites
7bf553d x86: Undo return-thunk damage
023a2b0 x86/retpoline: Use -mfunction-return
bb81f3a x86/retpoline: Swizzle retpoline thunk
545b45c x86/retpoline: Cleanup some #ifdefery
eee4f31 x86/cpufeatures: Move RETPOLINE flags to word 11
ccb25d7 x86/kvm/vmx: Make noinstr clean
2cd972a x86/realmode: build with -D__DISABLE_EXPORTS
6834878 x86/entry: Remove skip_r11rcx
40265bc objtool: Default ignore INT3 for unreachable
32b2cd6 bpf,x86: Respect X86_FEATURE_RETPOLINE*
74b5a9f bpf,x86: Simplify computing label offsets
1c2e7b4 x86/alternative: Add debug prints to apply_retpolines()
b93a0a7 x86/alternative: Try inline spectre_v2=retpoline,amd
a40925e x86/alternative: Handle Jcc _x86_indirect_thunk\reg
86900f9 x86/alternative: Implement .retpoline_sites support
936c8fc x86/retpoline: Create a retpoline thunk array
90ca76c x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
6a6fcb2 x86/asm: Fixup odd GEN-for-each-reg.h usage
71e578e x86/asm: Fix register order
18576e4 x86/retpoline: Remove unused replacement symbols
655d409 objtool: Introduce CFI hash
503882b objtool,x86: Replace alternatives with .retpoline_sites
cad0e43 objtool: Shrink struct instruction
c9fd00d objtool: Explicitly avoid self modifying code in .altinstr_replacement
29e6b52 objtool: Classify symbols
1fd333e x86/entry: Don't call error_entry() for XENPV
cac4146 x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
19ac6c9 x86/entry: Switch the stack after error_entry() returns
01bc8bd x86/traps: Use pt_regs directly in fixup_bad_iret()
Xanmod

Homepage
Download Linux 5.15.57-xanmod1 source from GitHub