Brendan Conoboy wrote: > This is probably where the "AMD is safe" rumor started, but that is > only 1/3, maybe 2/3. Now that the context is public let's be clear: > even AMD processors are vulnerable without the patched kernel Adam has > asked for help testing. But the patched kernel that was pushed includes this patch: https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8 which means the changes have no effect whatsoever on AMD CPUs unless you explicitly boot with pti=on. Kevin Kofler _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx