As written about early in the year, future Intel CPUs will be moving past the "Family 6" identification used since the mid-1990s with the P6 micro-architecture. Since then Intel has continued releasing new CPUs under "Family 6" with different model IDs while AMD has been more open to changing its Family ID every Zen generation or two. With Intel using Family 6 for so long it led to a lot of Linux kernel code just relying on Model ID comparisons for determining between Intel CPU generations and the like. Thus a lot of Intel CPU model handling reworks are needed for preparing future Intel CPU generations that will no longer be in Family 6. With Linux 6.12 it looks like that work will be wrapping up...
AMD engineers today posted the first "request for comments" patches in enabling support for Secure AVIC guest handling as a new hardware feature with upcoming processors...
The Intel Graphics Compiler (IGC) that is used on Windows as a shader compiler back-end and both for Windows/Linux as part of their OpenCL and oneAPI Level Zero compute stack can now be compiled for RISC-V 64-bit...
The BeOS-inspired Haiku OS is out today with its fifth beta release as it works toward the long-awaited Haiku R1 stable release...
Following the GNOME Foundation Executive Director leaving after less than one year, the GNOME Foundation has formally begun their search for a new executive director...
While not quite as exciting as the latest ARM64 laptops sporting the new Qualcomm Snapdragon X1 series SoCs, the Lenovo ThinkPad X13s laptop using the older Snapdragon 8cx Gen 3 is now available to boot and install using the generic ARM64 images of the upcoming Ubuntu 24.10...
David Kaplan who is a Senior Fellow at AMD focused on security technologies has published an initial set of Linux kernel patches for "Attack Vector Controls" in rethinking the CPU security mitigation handling. The proposed Attack Vector Controls makes it easier to manage desired security mitigations to have enabled/disabled based upon intent of the system rather than having to be knowledgeable about individual CPU security vulnerabilities and the various tuning knobs...
Pages