>> This is probably where the "AMD is safe" rumor started, but that is >> only 1/3, maybe 2/3. Now that the context is public let's be clear: >> even AMD processors are vulnerable without the patched kernel Adam has >> asked for help testing. > > But the patched kernel that was pushed includes this patch: > https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8 > which means the changes have no effect whatsoever on AMD CPUs unless you > explicitly boot with pti=on. As far as currently known, AMD CPUs are not affected by "meltdown" - the security vulnerability which pti tries to close. There are other issues known as "Spectre" where pti does not help and which does not only affect Intel CPUs. Best regards, Clemens _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx