tag:blogger.com,1999:blog-106995001197753879.post8647172783808432156..comments2024-03-27T09:25:21.091-03:00Comments on Linux Dicas e Suporte: Verificação alternativa para a vulnerabilidade intelLOBOhttp://www.blogger.com/profile/16733213175220612388noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-106995001197753879.post-70793056434027953932018-01-11T09:58:04.328-02:002018-01-11T09:58:04.328-02:00Use o sudo no ultimo comandoUse o sudo no ultimo comandoLOBOhttps://www.blogger.com/profile/16733213175220612388noreply@blogger.comtag:blogger.com,1999:blog-106995001197753879.post-30683875211341533642018-01-10T22:07:43.703-02:002018-01-10T22:07:43.703-02:00No meu deu esse resultado.
H61M-DS2 ~/Am-I-affect...No meu deu esse resultado.<br /><br />H61M-DS2 ~/Am-I-affected-by-Meltdown $ make<br />g++ -I. --std=c++11 -O0 --no-pie -fPIC -mrtm -DHAS_COMPILER_RTM_SUPPORT -c -o meltdown_checker.o meltdown_checker.cc <br />g++ -I. --std=c++11 -O0 --no-pie -fPIC -mrtm -DHAS_COMPILER_RTM_SUPPORT -o meltdown-checker meltdown_checker.o<br /><br />linuxmint@francis-H61M-DS2 ~/Am-I-affected-by-Meltdown $ ~/Am-I-affected-by-Meltdown/meltdown-checker<br />Unable to read /proc/kallsyms. That means your system doesn't allow non-root or any program to read the file.<br />Your options are either running the program as root *OR* setting /proc/sys/kernel/kptr_restrict to 0, as follow:<br />sudo sh -c "echo 0 > /proc/sys/kernel/kptr_restrict"<br />Abortado (imagem do núcleo gravada)<br />Francishttps://www.blogger.com/profile/11703606695339400365noreply@blogger.com