Back to home
Technology

Lenovo Legion devices running Linux set to get new 'Extreme' mode that fixes previously-broken power limits — only approved devices will be able to run the maximum performance mode

Source

Tom's Hardware

Published

TL;DR

AI Generated

Lenovo Legion devices running Linux are set to receive a new "Extreme" mode that fixes power limit issues previously experienced when using the devices with Linux. The patch, developed by Derek Clark, will only allow approved devices to run this mode to prevent bugs on lower-end or thermally-constrained units. The fix addresses misreported power profiles and ensures that Extreme mode is disabled by default until devices are validated for it. This update will provide correct power profiles for all Lenovo Legion devices on Linux, making gaming on the platform more efficient and enjoyable.

Read Full Article

Similar Articles

MindsEye's sabotage mission is being slammed as dull and pointless

MindsEye's sabotage mission is being slammed as dull and pointless

Build A Rocket Boy accuses individuals of sabotaging MindsEye's launch, spending over €1 million on damaging efforts. The studio integrates the controversy into a new in-game mission, Blacklist, to showcase evidence of sabotage to players. However, reports describe the mission as lackluster and failing to deliver a compelling narrative. Critics attribute the launch issues to internal problems, such as management and design decisions, casting doubt on the sabotage claims. The saga continues as MindsEye's post-launch turmoil unfolds.

TweakTown
Save a huge $400 on this Acer Predator OLED gaming laptop with an RTX 5070 Ti and 32GB DDR5, now under $1,800 — big saving on Helios Neo 16S AI rig that ships with a 24-core Intel CPU, 1TB SSD, and a 240Hz refresh rate

Save a huge $400 on this Acer Predator OLED gaming laptop with an RTX 5070 Ti and 32GB DDR5, now under $1,800 — big saving on Helios Neo 16S AI rig that ships with a 24-core Intel CPU, 1TB SSD, and a 240Hz refresh rate

Best Buy is offering a $400 discount on the Acer Predator Helios Neo 16S AI gaming laptop, now priced at $1,799.99. This laptop features an RTX 5070 Ti GPU, 32GB DDR5 RAM, and a 16-inch OLED display with a 240Hz refresh rate. Powered by an Intel Core Ultra 9 275HX CPU, it is designed for high-performance gaming and multitasking. The laptop's slim design includes various ports, Wi-Fi 6E, Bluetooth 5.4, and a 1TB SSD. This deal provides a cost-effective option for gamers seeking top-notch specs in a portable package.

Tom's Hardware
Commodore 64 and ZX Spectrum receive clamshell makeover — iconic 8-bit legends join the handheld gaming wars

Commodore 64 and ZX Spectrum receive clamshell makeover — iconic 8-bit legends join the handheld gaming wars

Retro Games Ltd and Blaze Entertainment are releasing handheld gaming devices inspired by the Commodore 64 and ZX Spectrum home computers from the '80s. Priced at $129.99, the C64 Handheld and Spectrum Handheld aim to bring nostalgia with modern convenience, featuring a clamshell design, 4.3-inch IPS screens, quad-core processors, and 256 MB of DDR memory. Both devices come pre-loaded with 25 retro games and offer expandable storage via a microSD card slot. The handhelds also include USB Type-A ports for connecting peripherals and are set to ship on October 15, with a collector's edition available for $149.99.

Tom's Hardware
Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.