cumim na to jako puk, ale je to proste tak
/proc/cmdline:
BOOT_IMAGE=/@/boot/vmlinuz-5.11.6-051106-generic root=UUID=d709ce9a-4281-4ed6-9d11-9e4d725029b1 ro rootflags=subvol=@ amdgpu.gpu_recovery=1 amdgpu.lockup_timeout=3000 net.ifnames=0 biosdevname=0 rcu_nocbs=3 amd_iommu=on iommu=pt kvm.ignore_msrs=1 vfio-pci.ids=10de:0140
model name : AMD Ryzen 3 2200G with Radeon Vega Graphics
Projeďte si to testerem, napíše vám, co chybí za mitigace. Ryzen je zasažen podmnožinou všech těch variant, pro úplnou mitigaci musíte mít opravený mikrokód v CPU, mitigace v kernelu a mitigace v userspace. Narozdíl od Intelu to ale nesebere podstatnou část výkonu.
# curl -L https://meltdown.ovh -o spectre-meltdown-checker.sh
# less spectre-meltdown-checker.sh
# sh spectre-meltdown-checker.sh
to jsem samozrejme kontroloval, vse bez ztraty kyticky, vcetne posledniho microkodu
proto jsem tak nervozni/nastvanej
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected