=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-205- _ctrlchar=$($echo_cmd $_interpret_chars "\033") spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:206: _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g") spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-207- fi ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-2417- # shellcheck disable=SC2086 spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:2418: if [ -n "$(eval echo \$$_mockvarname)" ] && [ "$(eval echo \$$_mockvarname)" -ne 0 ]; then spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-2419- _debug "read_msr: MOCKING enabled for msr $_msr func returns $(eval echo \$$_mockvarname)" ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3273- ##endif spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3274: #asm volatile( spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3275- # "cmp %1, %2\n" e1500003 ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3936- if [ ! -w "$specex_knob_dir/ibpb_enabled" ] && [ -e "$specex_knob_dir/retp_enabled" ]; then spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3937: explain "Both your CPU and your kernel have IBPB support, but it is currently disabled. You kernel should enable IBPB automatically if you enable retpoline. You may enable it with \`echo 1 > $specex_knob_dir/retp_enabled\`." spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3938- else spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3939: explain "Both your CPU and your kernel have IBPB support, but it is currently disabled. You may enable it with \`echo 1 > $specex_knob_dir/ibpb_enabled\`." spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3940- fi ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3959- if [ -e "$specex_knob_dir/ibrs_enabled" ]; then spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3960: explain "Both your CPU and your kernel have IBRS support, but it is currently disabled. You may enable it with \`echo 1 > $specex_knob_dir/ibrs_enabled\`." spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3961- else ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3975- elif [ "$retpoline" = 1 ] && [ "$retpoline_compiler" = 1 ] && [ "$retp_enabled" = 0 ]; then spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3976: explain "Your kernel has retpoline support and has been compiled with a retpoline-aware compiler, but retpoline is disabled. You should enable it with \`echo 1 > $specex_knob_dir/retp_enabled\`." spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3977- fi ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3983- #1 "Vulnerable" spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3984: #2 "Vulnerable: Minimal generic ASM retpoline" spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3985: #2 "Vulnerable: Minimal AMD ASM retpoline" spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3986- # "Mitigation: Full generic retpoline" ############################################## spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3991- # Red Hat only: spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3992: #2 "Vulnerable: Minimal ASM retpoline", spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3993- #3 "Vulnerable: Retpoline without IBPB",