===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-205-		_ctrlchar=$($echo_cmd $_interpret_chars "\033")
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:206:		_msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-207-	fi
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-2417-	# shellcheck disable=SC2086
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:2418:	if [ -n "$(eval echo \$$_mockvarname)" ] && [ "$(eval echo \$$_mockvarname)" -ne 0 ]; then
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-2419-		_debug "read_msr: MOCKING enabled for msr $_msr func returns $(eval echo \$$_mockvarname)"
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3273-		##endif
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3274:		#asm volatile(
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3275-		#	"cmp	%1, %2\n"      e1500003
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3936-						if [ ! -w "$specex_knob_dir/ibpb_enabled" ] && [ -e "$specex_knob_dir/retp_enabled" ]; then
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3937:							explain "Both your CPU and your kernel have IBPB support, but it is currently disabled. You kernel should enable IBPB automatically if you enable retpoline. You may enable it with \`echo 1 > $specex_knob_dir/retp_enabled\`."
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3938-						else
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3939:							explain "Both your CPU and your kernel have IBPB support, but it is currently disabled. You may enable it with \`echo 1 > $specex_knob_dir/ibpb_enabled\`."
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3940-						fi
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3959-					if [ -e "$specex_knob_dir/ibrs_enabled" ]; then
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3960:						explain "Both your CPU and your kernel have IBRS support, but it is currently disabled. You may enable it with \`echo 1 > $specex_knob_dir/ibrs_enabled\`."
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3961-					else
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3975-				elif [ "$retpoline" = 1 ] && [ "$retpoline_compiler" = 1 ] && [ "$retp_enabled" = 0 ]; then
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3976:					explain "Your kernel has retpoline support and has been compiled with a retpoline-aware compiler, but retpoline is disabled. You should enable it with \`echo 1 > $specex_knob_dir/retp_enabled\`."
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3977-				fi
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3983-	#1 "Vulnerable"
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3984:	#2 "Vulnerable: Minimal generic ASM retpoline"
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3985:	#2 "Vulnerable: Minimal AMD ASM retpoline"
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3986-	# "Mitigation: Full generic retpoline"
##############################################
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3991-	# Red Hat only:
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh:3992:	#2 "Vulnerable: Minimal ASM retpoline",
spectre-meltdown-checker-0.44/spectre-meltdown-checker.sh-3993-	#3 "Vulnerable: Retpoline without IBPB",