AMD first wants everyone to understand two points:
1. The loophole has not entered any public domain, that is, it has not been damaged in the real world.
2, all the characterization and destructive power of vulnerabilities are based on the laboratory level. Currently, those who are able to do all these invasive operations are experienced programmers who are familiar with electronic engineering.
AMD again, three attacks on Google Project Zero team simulation form based on the AMD processor to form 3 to form 2 almost completely immune, as immune (theory of attack, has been successfully simulated) on the morphology by OS, 1 level update to fill, and will not cause the loss of energy.
At the same time, the father of Linux is also not affected by the AMD processor on the Gihub.
Because the Linux 4.15 (candidate version) kernel restores Meltdown vulnerability, forcing the patch of kernel Page Table Isolation (kernel page table isolation, KPTI or PTI) to x86 processor, resulting in a significant decrease in performance. Linus Torvalds has made a close correction to the PTI processor.
Linux kernel development Tom Lendacky also tells HOP that the AMD processor is harmed by Intel. Because of different architecture, AMD processor does not allow memory reference class operation, otherwise it will cause page errors, so it is completely immune to Meltdown vulnerabilities.
At present, the Linux kernel 4.14, 4.9, 4.4, 3.16, 3.18, 3.12 LTS all repair the Meltdown vulnerability.