Language Selection

English French German Italian Portuguese Spanish

Intel cripples programs on AMD chips

Filed under
Hardware
Legal

Intel's compilers recognise when they're running on an AMD processor, and generates code that either degrades performance or causes it to crash. That's one of the many accusations in AMD's lengthy document of complaints against Intel in its recent lawsuit against the chip giant.

The paragraph in question, number 123, reads:

"Intel has designed its compiler purposely to degrade performance when a program is run on an AMD platform. To achieve this, Intel designed the compiler to compile code along several alternate code paths. Some paths are executed when the program runs on an Intel platform and others are executed when the program is operated on a computer with an AMD microprocessor. (The choice of code path is determined when the program is started, using a feature known as "CPUID" which identifies the computer's microprocessor.) By design, the code paths were not created equally. If the program detects a "Genuine Intel" microprocessor, it executes a fully optimized code path and operates with the maximum efficiency. However, if the program detects an "Authentic AMD" microprocessor, it executes a different code path that will degrade the program's performance or cause it to crash."

Among the other issues raised by AMD were:

- That Intel used illegal subsidies to win sales and, in some cases, threatened companies with "severe consequences" for using or selling AMD products.

- That Intel has allegedly abused its dominate market position by forcing major customers into exclusive deals in return for outright cash payments, discriminatory pricing or marketing subsidies.

Following AMD's accusations, representatives of the European Commission and of national competition authorities carried out on-site inspections of several Intel offices and of the offices of an undisclosed number of PC manufacturers, as part of "an ongoing competition investigation", according to an EC spokeswoman.

By Manek Dubash
Techworld

More in Tux Machines

Black Lab Brings Real-Time Kernel Patching to Its Enterprise Desktop 8 Linux OS

A few moments ago, Softpedia has been informed by Black Lab Software about the general availability of the sixth DP (Developer Preview) build of the upcoming Black Lab Linux Enterprise Desktop 8 OS. Sporting a new kernel from the Linux kernel from the 4.2 series, Black Lab Linux Enterprise Desktop 8 Developer Preview 6 arrives today for early adopters and public beta testers with real-time kernel patching, which means that you won't have to reboot your Black Lab Linux Enterprise OS after kernel upgrades. "DP6 offers you a window into what's new and whats coming when Black Lab Enterprise Desktop and Black Lab Enterprise Desktop for Education is released. As with our other developer previews it also aids in porting your applications to the new environment," said Roberto J. Dohnert, CEO, Black Lab Software. Read more

USB stick brings neural computing functions to devices

Movidius unveiled a “Fathom” USB stick and software framework for integrating accelerated neural networking processing into embedded and mobile devices. On April 28, Movidius announced availability of the USB-interfaced “Fathom Neural Compute Stick,” along with an underlying Fathom deep learning software framework. The device is billed as “the world’s first embedded neural network accelerator,” capable of allowing “powerful neural networks to be moved out of the cloud, and deployed natively in end-user devices.” Read more

ImageMagick Security Bug Puts Sites at Risk

  • Open Source ImageMagick Security Bug Puts Sites at Risk
    ImageMagick, an open source suite of tools for working with graphic images used by a large number of websites, has been found to contain a serious security vulnerability that puts sites using the software at risk for malicious code to be executed onsite. Security experts consider exploitation to be so easy they’re calling it “trivial,” and exploits are already circulating in the wild. The biggest risk is to sites that allows users to upload their own image files. Information about the vulnerability was made public Tuesday afternoon by Ryan Huber, a developer and security researcher, who wrote that he had little choice but to post about the exploit.
  • Huge number of sites imperiled by critical image-processing vulnerability
    A large number of websites are vulnerable to a simple attack that allows hackers to execute malicious code hidden inside booby-trapped images. The vulnerability resides in ImageMagick, a widely used image-processing library that's supported by PHP, Ruby, NodeJS, Python, and about a dozen other languages. Many social media and blogging sites, as well as a large number of content management systems, directly or indirectly rely on ImageMagick-based processing so they can resize images uploaded by end users.
  • Extreme photo-bombing: Bad ImageMagick bug puts countless websites at risk of hijacking
    A wildly popular software tool used by websites to process people's photos can be exploited to execute malicious code on servers and leak server-side files. Security bugs in the software are apparently being exploited in the wild right now to compromise at-risk systems. Patches to address the vulnerabilities are available in the latest source code – but are incomplete and have not been officially released, we're told.

Canonical to Offer Snappy Ubuntu 16 Images for Raspberry Pi 2, DragonBoard 410c

As you may know (or not), the Ubuntu Online Summit for Ubuntu 16.10 (Yakkety Yak) is taking place these days, between May 3 and May 5, on the Ubuntu On Air channel, where the Ubuntu devs are laying down plans for the future. We've already reported the other day that the next major release of the popular Linux kernel-based operating system, Ubuntu 16.10, which has been dubbed by Canonical and Ubuntu founder Mark Shuttleworth as Yakkety Yak, won't ship with the long-anticipated Unity 8 desktop interface as the default session. Read more