nixpkgs/nixos/modules/programs/gamemode.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

108 lines
2.9 KiB
Nix
Raw Normal View History

2021-05-18 00:31:45 +00:00
{
config,
lib,
pkgs,
...
}:
let
cfg = config.programs.gamemode;
settingsFormat = pkgs.formats.ini { listsAsDuplicateKeys = true; };
2021-05-18 00:31:45 +00:00
configFile = settingsFormat.generate "gamemode.ini" cfg.settings;
in
{
options = {
programs.gamemode = {
enable = lib.mkEnableOption "GameMode to optimise system performance on demand";
2021-05-18 00:31:45 +00:00
enableRenice =
lib.mkEnableOption "CAP_SYS_NICE on gamemoded to support lowering process niceness"
// {
2021-05-18 00:31:45 +00:00
default = true;
};
settings = lib.mkOption {
2021-05-18 00:31:45 +00:00
type = settingsFormat.type;
default = { };
2021-05-18 00:31:45 +00:00
description = ''
System-wide configuration for GameMode (/etc/gamemode.ini).
See gamemoded(8) man page for available settings.
'';
example = lib.literalExpression ''
2021-05-18 00:31:45 +00:00
{
general = {
renice = 10;
};
# Warning: GPU optimisations have the potential to damage hardware
gpu = {
apply_gpu_optimisations = "accept-responsibility";
gpu_device = 0;
amd_performance_level = "high";
};
custom = {
start = "''${pkgs.libnotify}/bin/notify-send 'GameMode started'";
end = "''${pkgs.libnotify}/bin/notify-send 'GameMode ended'";
};
}
'';
};
};
};
config = lib.mkIf cfg.enable {
2021-05-18 00:31:45 +00:00
environment = {
systemPackages = [ pkgs.gamemode ];
etc."gamemode.ini".source = configFile;
};
security = {
polkit.enable = true;
wrappers = lib.mkIf cfg.enableRenice {
2021-05-18 00:31:45 +00:00
gamemoded = {
owner = "root";
group = "root";
2021-05-18 00:31:45 +00:00
source = "${pkgs.gamemode}/bin/gamemoded";
capabilities = "cap_sys_nice+ep";
};
};
};
systemd = {
packages = [ pkgs.gamemode ];
user.services.gamemoded = {
# The upstream service already defines this, but doesn't get applied.
# See https://github.com/NixOS/nixpkgs/issues/81138
wantedBy = [ "default.target" ];
# Use pkexec from the security wrappers to allow users to
# run libexec/cpugovctl & libexec/gpuclockctl as root with
# the the actions defined in share/polkit-1/actions.
#
# This uses a link farm to make sure other wrapped executables
# aren't included in PATH.
environment.PATH = lib.mkForce (
pkgs.linkFarm "pkexec" [
2021-05-18 00:31:45 +00:00
{
name = "pkexec";
path = "${config.security.wrapperDir}/pkexec";
}
]
);
serviceConfig.ExecStart = lib.mkIf cfg.enableRenice [
2021-05-18 00:31:45 +00:00
"" # Tell systemd to clear the existing ExecStart list, to prevent appending to it.
"${config.security.wrapperDir}/gamemoded"
];
};
};
users.groups.gamemode = { };
2021-05-18 00:31:45 +00:00
};
meta = {
maintainers = with lib.maintainers; [ kira-bruneau ];
2021-05-18 00:31:45 +00:00
};
}