Not long ago I have posted the output of a CLI command to see how it looks on Intel architecture, The new uname -a linux output. Now had a chance to run exactly the same command on a AMD Ryzen architecture. This is running on a custom kernel, which has been configured especially for the hardware.

Linux scapegoat 5.6.3-gentoo #2 SMP Thu Apr 9 11:56:44 CEST 2020 x86_64 AMD Ryzen 5 PRO 3500U w/ Radeon Vega Mobile Gfx AuthenticAMD GNU/Linux
user % grep -r . /sys/devices/system/cpu/vulnerabilities

/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected

Here the output of a stock kernel that is shipped by the linux distribution, for cross reference:

Linux scapegoat 5.5.14 #1 SMP PREEMPT Thu Apr 2 07:41:59 -00 2020 x86_64 AMD Ryzen 5 PRO 3500U w/ Radeon Vega Mobile Gfx AuthenticAMD GNU/Linux
user % grep -r . /sys/devices/system/cpu/vulnerabilities

/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected /sys/devices/system/cpu/vulnerabilities/mds:Not affected /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected