AMD Athlon(tm) Neo X2 Dual Core Processor L325
[root@archlinux meltdown-exploit]# ./run.sh looking for linux_proc_banner in /proc/kallsyms cached = 21, uncached = 262, threshold 74 read ffffffffaf6009a0 = ff (score=0/1000) read ffffffffaf6009a1 = ff (score=0/1000) read ffffffffaf6009a2 = ff (score=0/1000) read ffffffffaf6009a3 = ff (score=0/1000) read ffffffffaf6009a4 = ff (score=0/1000) read ffffffffaf6009a5 = ff (score=0/1000) read ffffffffaf6009a6 = ff (score=0/1000) read ffffffffaf6009a7 = ff (score=0/1000) read ffffffffaf6009a8 = ff (score=0/1000) read ffffffffaf6009a9 = ff (score=0/1000) read ffffffffaf6009aa = ff (score=0/1000) read ffffffffaf6009ab = ff (score=0/1000) read ffffffffaf6009ac = ff (score=0/1000) read ffffffffaf6009ad = ff (score=0/1000) read ffffffffaf6009ae = ff (score=0/1000) read ffffffffaf6009af = ff (score=0/1000) NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 5.15.52-1-lts #1 SMP Sat, 02 Jul 2022 20:04:03 +0000 unknown processor : 0 vendor_id : AuthenticAMD cpu family : 15 model : 107 model name : AMD Athlon(tm) Neo X2 Dual Core Processor L325 stepping : 2 cpu MHz : 1496.357 cache size : 512 KB physical id : 0 siblings : 2