Simple script to check if your Linux machine is vulnerable to #Meltdown

Am I affected by Meltdown?! Meltdown (CVE-2017-5754) checker

What am I?

Proof-of-concept /

Exploit /

Checks whether the system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.

*** Only works on Linux for now ***

How does it work?

It works by using /proc/kallsyms to find system call table and checking whether the address of a system call found by exploiting MELTDOWN match the respective one in /proc/kallsyms.

What to do when you face this error “Unable to read /proc/kallsyms…”

That’s because your system may be preventing the program from reading kernel symbols in /proc/kallsyms due to /proc/sys/kernel/kptr_restrict set to 1. The following command will do the trick:

sudo sh -c “echo 0 > /proc/sys/kernel/kptr_restrict”

Please open an issue if you have an idea on how to fall back to another approach in this scenario.

Getting started

git clone
cd Am-I-affected-by-Meltdown

Copyright (c) 2018 Raphael S. Carvalho <>