We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
looking for linux_proc_banner in /proc/kallsyms protected. requires root
The text was updated successfully, but these errors were encountered:
No branches or pull requests
looking for linux_proc_banner in /proc/kallsyms
protected. requires root
cached = 23, uncached = 229, threshold 72
read ffffffffab600060 = ff (score=0/1000)
read ffffffffab600061 = ff (score=0/1000)
read ffffffffab600062 = ff (score=0/1000)
read ffffffffab600063 = ff (score=0/1000)
read ffffffffab600064 = ff (score=0/1000)
read ffffffffab600065 = ff (score=0/1000)
read ffffffffab600066 = ff (score=0/1000)
read ffffffffab600067 = ff (score=0/1000)
read ffffffffab600068 = ff (score=0/1000)
read ffffffffab600069 = ff (score=0/1000)
read ffffffffab60006a = ff (score=0/1000)
read ffffffffab60006b = ff (score=0/1000)
read ffffffffab60006c = ff (score=0/1000)
read ffffffffab60006d = ff (score=0/1000)
read ffffffffab60006e = ff (score=0/1000)
read ffffffffab60006f = ff (score=0/1000)
NOT VULNERABLE
PLEASE POST THIS TO Non-vulnerable CPU/kernels list #22
NOT VULNERABLE ON
4.15.0-45-generic Gentle warning if meltdown not compiled instead of scary false positi… #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 158
model name : Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz
stepping : 10
microcode : 0xde
cpu MHz : 2592.004
cache size : 12288 KB
physical id : 0
The text was updated successfully, but these errors were encountered: