* [bug#59053] [PATCH] gnu: Add spectre-meltdown-checker.
@ 2022-11-05 15:57 Hilton Chain via Guix-patches via
2022-11-05 16:45 ` Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-05 15:57 UTC (permalink / raw)
To: 59053
* gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch: New file.
* gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
* gnu/local.mk (dist_patch_DATA): Add it.
---
gnu/local.mk | 1 +
gnu/packages/linux.scm | 41 +++++++++++++++++++
...n-checker-support-guix-system-kernel.patch | 26 ++++++++++++
3 files changed, 68 insertions(+)
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index eb6ac3df58..88c1fa6278 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1848,6 +1848,7 @@ dist_patch_DATA = \
%D%/packages/patches/syslinux-strip-gnu-property.patch \
%D%/packages/patches/snappy-add-O2-flag-in-CmakeLists.txt.patch \
%D%/packages/patches/snappy-add-inline-for-GCC.patch \
+ %D%/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch \
%D%/packages/patches/sphinxbase-fix-doxygen.patch \
%D%/packages/patches/spice-vdagent-glib-2.68.patch \
%D%/packages/patches/sssd-optional-systemd.patch \
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index cf11a7fc1b..db199869a7 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -9512,3 +9512,44 @@ (define-public tp-smapi-module
@acronym{SMAPI, System Management Application Program Interface} and direct
access to the embedded controller.")
(license license:gpl2+)))
+
+(define-public spectre-meltdown-checker
+ (package
+ (name "spectre-meltdown-checker")
+ (version "0.45")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/speed47/spectre-meltdown-checker")
+ (commit (string-append "v" version))))
+ (file-name (git-file-name name version))
+ (patches
+ (search-patches
+ ;; https://github.com/speed47/spectre-meltdown-checker/pull/441
+ "spectre-meltdown-checker-support-guix-system-kernel.patch"))
+ (sha256
+ (base32
+ "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
+ (build-system copy-build-system)
+ (arguments
+ (list #:install-plan
+ #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-checker"))
+ #:phases
+ #~(modify-phases %standard-phases
+ (add-after 'unpack 'fixpath
+ (lambda* (#:key inputs #:allow-other-keys)
+ (substitute* "spectre-meltdown-checker.sh"
+ (("\\$\\{opt_arch_prefix\\}readelf")
+ (search-input-file inputs "/bin/readelf"))
+ (("perl")
+ (search-input-file inputs "/bin/perl"))))))))
+ (inputs (list binutils perl))
+ (home-page "https://github.com/speed47/spectre-meltdown-checker")
+ (synopsis
+ "Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability /
+mitigation checker for Linux & BSD")
+ (description
+ "A shell script to assess your system's resilience against the several
+transient execution CVEs that were published since early 2018, and give you
+guidance as to how to mitigate them.")
+ (license license:gpl3)))
diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
new file mode 100644
index 0000000000..afec52b418
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
@@ -0,0 +1,26 @@
+From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 5 Nov 2022 23:22:31 +0800
+Subject: [PATCH] Add support for Guix System kernel.
+
+---
+ spectre-meltdown-checker.sh | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 248a444..855a090 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
+ [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
++ # Guix System:
++ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+ [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
+ # Clear Linux:
+
+base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
+--
+2.38.0
base-commit: 2211f50ec1ebcf5f880454b4133ac40e41abac21
--
2.38.0
^ permalink raw reply related [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH] gnu: Add spectre-meltdown-checker.
2022-11-05 15:57 [bug#59053] [PATCH] gnu: Add spectre-meltdown-checker Hilton Chain via Guix-patches via
@ 2022-11-05 16:45 ` Liliana Marie Prikler
2022-11-11 11:10 ` [bug#59053] [PATCH v2] " Hilton Chain via Guix-patches via
0 siblings, 1 reply; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-05 16:45 UTC (permalink / raw)
To: Hilton Chain, 59053; +Cc: control
merge 59053 49898
thanks
Hi Hilton,
thanks for the renewed interest in spectre-meltdown-checker. See the
other thread for a general discussion, but I'll repeat the most
important points.
Am Samstag, dem 05.11.2022 um 23:57 +0800 schrieb Hilton Chain:
> * gnu/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch: New file.
> * gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
> * gnu/local.mk (dist_patch_DATA): Add it.
Note that "Add it" lost its context because the new variable is between
it and the file added.
> ---
> gnu/local.mk | 1 +
> gnu/packages/linux.scm | 41
> +++++++++++++++++++
> ...n-checker-support-guix-system-kernel.patch | 26 ++++++++++++
> 3 files changed, 68 insertions(+)
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> support-guix-system-kernel.patch
>
> diff --git a/gnu/local.mk b/gnu/local.mk
> index eb6ac3df58..88c1fa6278 100644
> --- a/gnu/local.mk
> +++ b/gnu/local.mk
> @@ -1848,6 +1848,7 @@ dist_patch_DATA
> = \
> %D%/packages/patches/syslinux-strip-gnu-property.patch \
> %D%/packages/patches/snappy-add-O2-flag-in-
> CmakeLists.txt.patch \
> %D%/packages/patches/snappy-add-inline-for-GCC.patch \
> + %D%/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch \
> %D%/packages/patches/sphinxbase-fix-doxygen.patch \
> %D%/packages/patches/spice-vdagent-glib-2.68.patch \
> %D%/packages/patches/sssd-optional-systemd.patch \
> diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
> index cf11a7fc1b..db199869a7 100644
> --- a/gnu/packages/linux.scm
> +++ b/gnu/packages/linux.scm
> @@ -9512,3 +9512,44 @@ (define-public tp-smapi-module
> @acronym{SMAPI, System Management Application Program Interface} and
> direct
> access to the embedded controller.")
> (license license:gpl2+)))
> +
> +(define-public spectre-meltdown-checker
> + (package
> + (name "spectre-meltdown-checker")
> + (version "0.45")
> + (source (origin
> + (method git-fetch)
> + (uri (git-reference
> + (url
> "https://github.com/speed47/spectre-meltdown-checker")
> + (commit (string-append "v" version))))
> + (file-name (git-file-name name version))
> + (patches
> + (search-patches
> + ;;
> https://github.com/speed47/spectre-meltdown-checker/pull/441
> + "spectre-meltdown-checker-support-guix-system-
> kernel.patch"))
> + (sha256
> + (base32
> +
> "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
> + (build-system copy-build-system)
> + (arguments
> + (list #:install-plan
> + #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-
> checker"))
> + #:phases
> + #~(modify-phases %standard-phases
> + (add-after 'unpack 'fixpath
> + (lambda* (#:key inputs #:allow-other-keys)
> + (substitute* "spectre-meltdown-checker.sh"
> + (("\\$\\{opt_arch_prefix\\}readelf")
> + (search-input-file inputs "/bin/readelf"))
> + (("perl")
> + (search-input-file inputs "/bin/perl"))))))))
I'm pretty sure readelf and perl are not the only commands invoked.
> + (inputs (list binutils perl))
> + (home-page
> "https://github.com/speed47/spectre-meltdown-checker")
> + (synopsis
> + "Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad
> vulnerability /
> +mitigation checker for Linux & BSD")
"for Linux & BSD" is gratuitous information imho.
As for the vulnerabilities listed in the synopsis surely there must be
a way of shortening that.
> + (description
> + "A shell script to assess your system's resilience against the
> several
> +transient execution CVEs that were published since early 2018, and
> give you
> +guidance as to how to mitigate them.")
Not a full sentence.
> + (license license:gpl3)))
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-
> guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-
> checker-support-guix-system-kernel.patch
> new file mode 100644
> index 0000000000..afec52b418
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-
> system-kernel.patch
> @@ -0,0 +1,26 @@
> +From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Sat, 5 Nov 2022 23:22:31 +0800
> +Subject: [PATCH] Add support for Guix System kernel.
> +
> +---
> + spectre-meltdown-checker.sh | 2 ++
> + 1 file changed, 2 insertions(+)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 248a444..855a090 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
> + [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> + # NixOS:
> + [ -e "/run/booted-system/kernel" ] &&
> opt_kernel="/run/booted-system/kernel"
> ++ # Guix System:
> ++ [ -e "/run/booted-system/kernel/bzImage" ] &&
> opt_kernel="/run/booted-system/kernel/bzImage"
> + # systemd kernel-install:
> + [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux"
> + # Clear Linux:
> +
> +base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
> +--
> +2.38.0
>
> base-commit: 2211f50ec1ebcf5f880454b4133ac40e41abac21
This patch LGTM.
Note that as discussed in the other thread, we'd also want the checker
to not download proprietary firmware. Could you adjust the package
accordingly?
Cheers
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v2] gnu: Add spectre-meltdown-checker.
2022-11-05 16:45 ` Liliana Marie Prikler
@ 2022-11-11 11:10 ` Hilton Chain via Guix-patches via
2022-11-11 15:13 ` Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-11 11:10 UTC (permalink / raw)
To: Liliana Marie Prikler; +Cc: control, 59053
* gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
* gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch:
New file.
* gnu/local.mk (dist_patch_DATA): Add patches.
---
v1 -> v2:
gnu/local.mk | 3 +
gnu/packages/linux.scm | 53 +
...ker-remove-builtin-firmware-database.patch | 554 +++++
...cker-stage-commands-for-substitution.patch | 1947 +++++++++++++++++
...n-checker-support-guix-system-kernel.patch | 26 +
5 files changed, 2583 insertions(+)
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index 27b31ea27f..d518cd8641 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1851,6 +1851,9 @@ dist_patch_DATA = \
%D%/packages/patches/syslinux-strip-gnu-property.patch \
%D%/packages/patches/snappy-add-O2-flag-in-CmakeLists.txt.patch \
%D%/packages/patches/snappy-add-inline-for-GCC.patch \
+ %D%/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch \
+ %D%/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch \
+ %D%/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch \
%D%/packages/patches/sphinxbase-fix-doxygen.patch \
%D%/packages/patches/spice-vdagent-glib-2.68.patch \
%D%/packages/patches/sssd-optional-systemd.patch \
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index 2c06269504..5a0d55833a 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -9595,3 +9595,56 @@ (define-public edac-utils
error detection and correction (EDAC).")
(home-page "https://github.com/grondo/edac-utils")
(license license:gpl2+)))
+
+(define-public spectre-meltdown-checker
+ (package
+ (name "spectre-meltdown-checker")
+ (version "0.45")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/speed47/spectre-meltdown-checker")
+ (commit (string-append "v" version))))
+ (file-name (git-file-name name version))
+ (patches
+ (search-patches
+ ;; https://github.com/speed47/spectre-meltdown-checker/pull/441
+ "spectre-meltdown-checker-support-guix-system-kernel.patch"
+ ;; NOTE: Update these patches when updating.
+ "spectre-meltdown-checker-stage-commands-for-substitution.patch"
+ "spectre-meltdown-checker-remove-builtin-firmware-database.patch"))
+ (sha256
+ (base32
+ "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
+ (build-system copy-build-system)
+ (arguments
+ (list #:install-plan
+ #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-checker"))
+ #:phases
+ #~(modify-phases %standard-phases
+ (add-after 'unpack 'fixpath
+ (lambda* (#:key inputs #:allow-other-keys)
+ (substitute* "spectre-meltdown-checker.sh"
+ (("@sysctl@") (search-input-file inputs "/sbin/sysctl"))
+ (("@([a-z0-9]*)@" _ m _)
+ (search-input-file inputs (string-append "/bin/" m)))))))))
+ (inputs
+ (list binutils
+ coreutils
+ grep
+ kmod
+ lz4
+ lzop
+ perl
+ procps
+ sharutils
+ util-linux
+ which
+ zstd))
+ (home-page "https://github.com/speed47/spectre-meltdown-checker")
+ (synopsis "CPU vulnerability / mitigation checker")
+ (description
+ "This package provides a shell script to assess your system's resilience
+against the several transient execution CVEs that were published since early
+2018, and give you guidance as to how to mitigate them.")
+ (license license:gpl3)))
diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
new file mode 100644
index 0000000000..e926551550
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
@@ -0,0 +1,554 @@
+From ac4bb2e61e4e8d195d560014816e107b315817ff Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Fri, 11 Nov 2022 18:55:25 +0800
+Subject: [PATCH 2/2] Remove builtin firmware database.
+
+---
+ spectre-meltdown-checker.sh | 477 ++----------------------------------
+ 1 file changed, 27 insertions(+), 450 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 82cf1b6..79c4bb7 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -95,7 +95,6 @@ show_usage()
+ --cpu [#,all] interact with CPUID and MSR of CPU core number #, or all (default: CPU core 0)
+ --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome
+ MCExtractor project and the Intel firmwares GitHub repository)
+- --update-builtin-fwdb same as --update-fwdb but update builtin DB inside the script itself
+ --dump-mock-data used to mimick a CPU on an other system, mainly used to help debugging this script
+
+ Return codes:
+@@ -853,9 +852,9 @@ update_fwdb()
+ mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
+ mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+ _info_nol "Fetching MCE.db from the MCExtractor project... "
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
++ # if command -v wget >/dev/null 2>&1; then
++ # wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
++ if command -v curl >/dev/null 2>&1; then
+ curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+ elif command -v fetch >/dev/null 2>&1; then
+ fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+@@ -874,9 +873,9 @@ update_fwdb()
+ intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+ _info_nol "Fetching Intel firmwares... "
+ ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
++ # if command -v wget >/dev/null 2>&1; then
++ # wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
++ if command -v curl >/dev/null 2>&1; then
+ curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+ elif command -v fetch >/dev/null 2>&1; then
+ fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+@@ -969,13 +968,13 @@ update_fwdb()
+ } > "$mcedb_cache"
+ echo DONE "(version $dbversion)"
+
+- if [ "$1" = builtin ]; then
+- newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
+- @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- @cat@ "$newfile" > "$0"
+- @rm@ -f "$newfile"
+- fi
++ # if [ "$1" = builtin ]; then
++ # newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
++ # @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
++ # @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
++ # @cat@ "$newfile" > "$0"
++ # @rm@ -f "$newfile"
++ # fi
+ }
+
+ parse_opt_file()
+@@ -1070,9 +1069,9 @@ while [ -n "${1:-}" ]; do
+ elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb" ]; then
+ update_fwdb
+ exit $?
+- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--update-builtin-mcedb" ]; then
+- update_fwdb builtin
+- exit $?
++ # elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--update-builtin-mcedb" ]; then
++ # update_fwdb builtin
++ # exit $?
+ elif [ "$1" = "--dump-mock-data" ]; then
+ opt_mock=1
+ shift
+@@ -2033,22 +2032,22 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
++# builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | @sort@ -V | @head@ -n1)
+- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
++ # older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | @sort@ -V | @head@ -n1)
++ # if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+ mcedb_source="$mcedb_cache"
+ mcedb_info="local firmwares DB $local_dbversion"
+- fi
++ # fi
+ fi
+ # if mcedb_source is not set, either we don't have a local cached db, or it is older than the builtin db
+-if [ -z "${mcedb_source:-}" ]; then
+- mcedb_source="$0"
+- mcedb_info="builtin firmwares DB $builtin_dbversion"
+-fi
++# if [ -z "${mcedb_source:-}" ]; then
++# mcedb_source="$0"
++# mcedb_info="builtin firmwares DB $builtin_dbversion"
++# fi
+ read_mcedb()
+ {
+ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
+@@ -2070,6 +2069,9 @@ is_latest_known_ucode()
+ else
+ return 2
+ fi
++ if [ -z "$mcedb_source" ]; then
++ return 2
++ fi
+ for tuple in $(read_mcedb | @grep@ "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
+ do
+ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
+@@ -5833,428 +5835,3 @@ fi
+ [ "$global_critical" = 1 ] && exit 2 # critical
+ [ "$global_unknown" = 1 ] && exit 3 # unknown
+ exit 0 # ok
+-
+-# We're using MCE.db from the excellent platomav's MCExtractor project
+-# The builtin version follows, but the user can download an up-to-date copy (to be stored in his $HOME) by using --update-fwdb
+-# To update the builtin version itself (by *modifying* this very file), use --update-builtin-fwdb
+-
+-# %%% MCEDB v222+i20220208
+-# I,0x00000611,0x00000B27,19961218
+-# I,0x00000612,0x000000C6,19961210
+-# I,0x00000616,0x000000C6,19961210
+-# I,0x00000617,0x000000C6,19961210
+-# I,0x00000619,0x000000D2,19980218
+-# I,0x00000630,0x00000013,19960827
+-# I,0x00000632,0x00000020,19960903
+-# I,0x00000633,0x00000036,19980923
+-# I,0x00000634,0x00000037,19980923
+-# I,0x00000650,0x00000045,19990525
+-# I,0x00000651,0x00000042,19990525
+-# I,0x00000652,0x0000002D,19990518
+-# I,0x00000653,0x00000010,19990628
+-# I,0x00000660,0x0000000A,19990505
+-# I,0x00000665,0x00000003,19990505
+-# I,0x0000066A,0x0000000D,19990505
+-# I,0x0000066D,0x00000007,19990505
+-# I,0x00000670,0x00000007,19980602
+-# I,0x00000671,0x00000014,19980811
+-# I,0x00000672,0x00000038,19990922
+-# I,0x00000673,0x0000002E,19990910
+-# I,0x00000680,0x00000017,19990610
+-# I,0x00000681,0x00000014,19991209
+-# I,0x00000683,0x00000014,20010206
+-# I,0x00000686,0x00000008,20000505
+-# I,0x0000068A,0x00000005,20001207
+-# I,0x00000690,0x00000004,20000206
+-# I,0x00000691,0x00000001,20020527
+-# I,0x00000692,0x00000001,20020620
+-# I,0x00000694,0x00000002,20020926
+-# I,0x00000695,0x00000047,20041109
+-# I,0x00000696,0x00000001,20000707
+-# I,0x000006A0,0x00000003,20000110
+-# I,0x000006A1,0x00000001,20000306
+-# I,0x000006A4,0x00000001,20000616
+-# I,0x000006B0,0x0000001A,20010129
+-# I,0x000006B1,0x0000001D,20010220
+-# I,0x000006B4,0x00000002,20020111
+-# I,0x000006D0,0x00000006,20030522
+-# I,0x000006D1,0x00000009,20030709
+-# I,0x000006D2,0x00000010,20030814
+-# I,0x000006D6,0x00000018,20041017
+-# I,0x000006D8,0x00000021,20060831
+-# I,0x000006E0,0x00000008,20050215
+-# I,0x000006E1,0x0000000C,20050413
+-# I,0x000006E4,0x00000026,20050816
+-# I,0x000006E8,0x0000003C,20060208
+-# I,0x000006EC,0x0000005B,20070208
+-# I,0x000006F0,0x00000005,20050818
+-# I,0x000006F1,0x00000012,20051129
+-# I,0x000006F2,0x0000005D,20101002
+-# I,0x000006F4,0x00000028,20060417
+-# I,0x000006F5,0x00000039,20060727
+-# I,0x000006F6,0x000000D2,20101001
+-# I,0x000006F7,0x0000006B,20101002
+-# I,0x000006F9,0x00000084,20061012
+-# I,0x000006FA,0x00000095,20101002
+-# I,0x000006FB,0x000000C1,20111004
+-# I,0x000006FD,0x000000A4,20101002
+-# I,0x00000F00,0xFFFF0001,20000130
+-# I,0x00000F01,0xFFFF0007,20000404
+-# I,0x00000F02,0xFFFF000B,20000518
+-# I,0x00000F03,0xFFFF0001,20000518
+-# I,0x00000F04,0xFFFF0010,20000803
+-# I,0x00000F05,0x0000000C,20000824
+-# I,0x00000F06,0x00000004,20000911
+-# I,0x00000F07,0x00000012,20020716
+-# I,0x00000F08,0x00000008,20001101
+-# I,0x00000F09,0x00000008,20010104
+-# I,0x00000F0A,0x00000015,20020821
+-# I,0x00000F11,0x0000000A,20030729
+-# I,0x00000F12,0x0000002F,20030502
+-# I,0x00000F13,0x00000005,20030508
+-# I,0x00000F20,0x00000001,20010423
+-# I,0x00000F21,0x00000003,20010529
+-# I,0x00000F22,0x00000005,20030729
+-# I,0x00000F23,0x0000000D,20010817
+-# I,0x00000F24,0x00000021,20030610
+-# I,0x00000F25,0x0000002C,20040826
+-# I,0x00000F26,0x00000010,20040805
+-# I,0x00000F27,0x00000039,20030604
+-# I,0x00000F29,0x0000002F,20040811
+-# I,0x00000F30,0x00000013,20030815
+-# I,0x00000F31,0x0000000B,20031021
+-# I,0x00000F32,0x0000000A,20040511
+-# I,0x00000F33,0x0000000C,20050421
+-# I,0x00000F34,0x00000017,20050421
+-# I,0x00000F36,0x00000007,20040309
+-# I,0x00000F37,0x00000003,20031218
+-# I,0x00000F40,0x00000006,20040318
+-# I,0x00000F41,0x00000017,20050422
+-# I,0x00000F42,0x00000003,20050421
+-# I,0x00000F43,0x00000005,20050421
+-# I,0x00000F44,0x00000006,20050421
+-# I,0x00000F46,0x00000004,20050411
+-# I,0x00000F47,0x00000003,20050421
+-# I,0x00000F48,0x0000000E,20080115
+-# I,0x00000F49,0x00000003,20050421
+-# I,0x00000F4A,0x00000004,20051214
+-# I,0x00000F60,0x00000005,20050124
+-# I,0x00000F61,0x00000008,20050610
+-# I,0x00000F62,0x0000000F,20051215
+-# I,0x00000F63,0x00000005,20051010
+-# I,0x00000F64,0x00000004,20051223
+-# I,0x00000F65,0x0000000B,20070510
+-# I,0x00000F66,0x0000001B,20060310
+-# I,0x00000F68,0x00000009,20060714
+-# I,0x00001632,0x00000002,19980610
+-# I,0x00010650,0x00000002,20060513
+-# I,0x00010660,0x00000004,20060612
+-# I,0x00010661,0x00000045,20101004
+-# I,0x00010670,0x00000005,20070209
+-# I,0x00010671,0x00000106,20070329
+-# I,0x00010674,0x84050100,20070726
+-# I,0x00010676,0x00000612,20150802
+-# I,0x00010677,0x0000070D,20150802
+-# I,0x0001067A,0x00000A0E,20150729
+-# I,0x000106A0,0xFFFF001A,20071128
+-# I,0x000106A1,0xFFFF000B,20080220
+-# I,0x000106A2,0xFFFF0019,20080714
+-# I,0x000106A4,0x00000013,20150630
+-# I,0x000106A5,0x0000001D,20180511
+-# I,0x000106C0,0x00000007,20070824
+-# I,0x000106C1,0x00000109,20071203
+-# I,0x000106C2,0x00000219,20090410
+-# I,0x000106C9,0x00000007,20090213
+-# I,0x000106CA,0x00000107,20090825
+-# I,0x000106D0,0x00000005,20071204
+-# I,0x000106D1,0x0000002A,20150803
+-# I,0x000106E0,0xFFFF0022,20090116
+-# I,0x000106E1,0xFFFF000D,20090206
+-# I,0x000106E2,0xFFFF0011,20090924
+-# I,0x000106E3,0xFFFF0011,20090512
+-# I,0x000106E4,0x00000003,20130701
+-# I,0x000106E5,0x0000000A,20180508
+-# I,0x000106F0,0xFFFF0009,20090210
+-# I,0x000106F1,0xFFFF0007,20090210
+-# I,0x00020650,0xFFFF0008,20090218
+-# I,0x00020651,0xFFFF0018,20090818
+-# I,0x00020652,0x00000011,20180508
+-# I,0x00020654,0xFFFF0007,20091124
+-# I,0x00020655,0x00000007,20180423
+-# I,0x00020661,0x00000105,20110718
+-# I,0x000206A0,0x00000029,20091102
+-# I,0x000206A1,0x00000007,20091223
+-# I,0x000206A2,0x00000027,20100502
+-# I,0x000206A3,0x00000009,20100609
+-# I,0x000206A4,0x00000022,20100414
+-# I,0x000206A5,0x00000007,20100722
+-# I,0x000206A6,0x90030028,20100924
+-# I,0x000206A7,0x0000002F,20190217
+-# I,0x000206C0,0xFFFF001C,20091214
+-# I,0x000206C1,0x00000006,20091222
+-# I,0x000206C2,0x0000001F,20180508
+-# I,0x000206D0,0x80000006,20100816
+-# I,0x000206D1,0x80000106,20101201
+-# I,0x000206D2,0xAF506958,20110714
+-# I,0x000206D3,0xAF50696A,20110816
+-# I,0x000206D5,0xAF5069E5,20120118
+-# I,0x000206D6,0x00000621,20200304
+-# I,0x000206D7,0x0000071A,20200324
+-# I,0x000206E0,0xE3493401,20090108
+-# I,0x000206E1,0xE3493402,20090224
+-# I,0x000206E2,0xFFFF0004,20081001
+-# I,0x000206E3,0xE4486547,20090701
+-# I,0x000206E4,0xFFFF0008,20090619
+-# I,0x000206E5,0xFFFF0018,20091215
+-# I,0x000206E6,0x0000000D,20180515
+-# I,0x000206F0,0x00000005,20100729
+-# I,0x000206F1,0x00000008,20101013
+-# I,0x000206F2,0x0000003B,20180516
+-# I,0x00030650,0x00000009,20120118
+-# I,0x00030651,0x00000110,20131014
+-# I,0x00030660,0x00000003,20101103
+-# I,0x00030661,0x0000010F,20150721
+-# I,0x00030669,0x0000010D,20130515
+-# I,0x00030671,0x00000117,20130410
+-# I,0x00030672,0x0000022E,20140401
+-# I,0x00030673,0x83290100,20190916
+-# I,0x00030678,0x00000838,20190422
+-# I,0x00030679,0x0000090D,20190710
+-# I,0x000306A0,0x00000007,20110407
+-# I,0x000306A2,0x0000000C,20110725
+-# I,0x000306A4,0x00000007,20110908
+-# I,0x000306A5,0x00000009,20111110
+-# I,0x000306A6,0x00000004,20111114
+-# I,0x000306A8,0x00000010,20120220
+-# I,0x000306A9,0x00000021,20190213
+-# I,0x000306C0,0xFFFF0013,20111110
+-# I,0x000306C1,0xFFFF0014,20120725
+-# I,0x000306C2,0xFFFF0006,20121017
+-# I,0x000306C3,0x00000028,20191112
+-# I,0x000306D1,0xFFFF0009,20131015
+-# I,0x000306D2,0xFFFF0009,20131219
+-# I,0x000306D3,0xE3121338,20140825
+-# I,0x000306D4,0x0000002F,20191112
+-# I,0x000306E0,0xE920080F,20121113
+-# I,0x000306E2,0xE9220827,20130523
+-# I,0x000306E3,0x00000308,20130321
+-# I,0x000306E4,0x0000042E,20190314
+-# I,0x000306E6,0x00000600,20130619
+-# I,0x000306E7,0x00000715,20190314
+-# I,0x000306F0,0xFFFF0017,20130730
+-# I,0x000306F1,0xD141D629,20140416
+-# I,0x000306F2,0x00000049,20210811
+-# I,0x000306F3,0x0000000D,20160211
+-# I,0x000306F4,0x0000001A,20210524
+-# I,0x00040650,0xFFFF000B,20121206
+-# I,0x00040651,0x00000026,20191112
+-# I,0x00040660,0xFFFF0011,20121012
+-# I,0x00040661,0x0000001C,20191112
+-# I,0x00040670,0xFFFF0006,20140304
+-# I,0x00040671,0x00000022,20191112
+-# I,0x000406A0,0x80124001,20130521
+-# I,0x000406A8,0x0000081F,20140812
+-# I,0x000406A9,0x0000081F,20140812
+-# I,0x000406C1,0x0000010B,20140814
+-# I,0x000406C2,0x00000221,20150218
+-# I,0x000406C3,0x00000368,20190423
+-# I,0x000406C4,0x00000411,20190423
+-# I,0x000406D0,0x0000000E,20130612
+-# I,0x000406D8,0x0000012D,20190916
+-# I,0x000406E1,0x00000020,20141111
+-# I,0x000406E2,0x0000002C,20150521
+-# I,0x000406E3,0x000000EC,20210428
+-# I,0x000406E8,0x00000026,20160414
+-# I,0x000406F0,0x00000014,20150702
+-# I,0x000406F1,0x0B000040,20210519
+-# I,0x00050650,0x8000002B,20160208
+-# I,0x00050651,0x8000002B,20160208
+-# I,0x00050652,0x80000037,20170502
+-# I,0x00050653,0x0100015C,20210526
+-# I,0x00050654,0x02006C0A,20210616
+-# I,0x00050655,0x03000012,20190412
+-# I,0x00050656,0x0400320A,20210813
+-# I,0x00050657,0x0500320A,20210813
+-# I,0x0005065A,0x86002302,20210416
+-# I,0x0005065B,0x07002402,20210604
+-# I,0x00050661,0xF1000008,20150130
+-# I,0x00050662,0x0000001C,20190617
+-# I,0x00050663,0x0700001C,20210612
+-# I,0x00050664,0x0F00001A,20210612
+-# I,0x00050665,0x0E000014,20210918
+-# I,0x00050670,0xFFFF0030,20151113
+-# I,0x00050671,0x000001B6,20180108
+-# I,0x000506A0,0x00000038,20150112
+-# I,0x000506C2,0x00000014,20180511
+-# I,0x000506C8,0x90011010,20160323
+-# I,0x000506C9,0x00000046,20210510
+-# I,0x000506CA,0x00000022,20210622
+-# I,0x000506D1,0x00000102,20150605
+-# I,0x000506E0,0x00000018,20141119
+-# I,0x000506E1,0x0000002A,20150602
+-# I,0x000506E2,0x0000002E,20150815
+-# I,0x000506E3,0x000000F0,20211112
+-# I,0x000506E8,0x00000034,20160710
+-# I,0x000506F0,0x00000010,20160607
+-# I,0x000506F1,0x00000036,20210510
+-# I,0x00060660,0x0000000C,20160821
+-# I,0x00060661,0x0000000E,20170128
+-# I,0x00060662,0x00000022,20171129
+-# I,0x00060663,0x0000002A,20180417
+-# I,0x000606A0,0x80000031,20200308
+-# I,0x000606A4,0x0B000280,20200817
+-# I,0x000606A5,0x0C0002F0,20210308
+-# I,0x000606A6,0x0D000332,20211217
+-# I,0x000606E0,0x0000000B,20161104
+-# I,0x000606E1,0x00000108,20190423
+-# I,0x000706A0,0x00000026,20170712
+-# I,0x000706A1,0x00000038,20210510
+-# I,0x000706A8,0x0000001C,20210510
+-# I,0x000706E0,0x0000002C,20180614
+-# I,0x000706E1,0x00000042,20190420
+-# I,0x000706E2,0x00000042,20190420
+-# I,0x000706E3,0x81000008,20181002
+-# I,0x000706E4,0x00000046,20190905
+-# I,0x000706E5,0x000000A8,20210526
+-# I,0x00080650,0x00000018,20180108
+-# I,0x00080664,0x0B00000F,20210217
+-# I,0x00080665,0x0B00000F,20210217
+-# I,0x000806A0,0x00000010,20190507
+-# I,0x000806A1,0x0000002D,20210902
+-# I,0x000806C0,0x00000068,20200402
+-# I,0x000806C1,0x0000009C,20211026
+-# I,0x000806C2,0x00000022,20210716
+-# I,0x000806D0,0x00000050,20201217
+-# I,0x000806D1,0x0000003C,20210716
+-# I,0x000806E9,0x000000EC,20210428
+-# I,0x000806EA,0x000000EC,20210428
+-# I,0x000806EB,0x000000EC,20210428
+-# I,0x000806EC,0x000000EC,20210428
+-# I,0x00090660,0x00000009,20200617
+-# I,0x00090661,0x00000015,20210921
+-# I,0x00090670,0x00000019,20201111
+-# I,0x00090671,0x0000001C,20210614
+-# I,0x00090672,0x0000001F,20220303
+-# I,0x00090674,0x00000219,20210425
+-# I,0x00090675,0x0000001F,20220303
+-# I,0x000906A0,0x0000001C,20210614
+-# I,0x000906A1,0x0000011F,20211104
+-# I,0x000906A2,0x00000315,20220102
+-# I,0x000906A3,0x0000041B,20220308
+-# I,0x000906A4,0x0000041B,20220308
+-# I,0x000906C0,0x2400001F,20210809
+-# I,0x000906E9,0x000000F0,20211112
+-# I,0x000906EA,0x000000EC,20210428
+-# I,0x000906EB,0x000000EC,20210428
+-# I,0x000906EC,0x000000EC,20210428
+-# I,0x000906ED,0x000000EC,20210428
+-# I,0x000A0650,0x000000BE,20191010
+-# I,0x000A0651,0x000000C2,20191113
+-# I,0x000A0652,0x000000EC,20210428
+-# I,0x000A0653,0x000000EC,20210428
+-# I,0x000A0654,0x000000C6,20200123
+-# I,0x000A0655,0x000000EE,20210428
+-# I,0x000A0660,0x000000EA,20210428
+-# I,0x000A0661,0x000000EC,20210429
+-# I,0x000A0670,0x0000002C,20201124
+-# I,0x000A0671,0x00000050,20210829
+-# I,0x000A0680,0x80000002,20200121
+-# I,0x000B0670,0x00000009,20211115
+-# I,0x000B06F2,0x0000001F,20220303
+-# I,0x000B06F5,0x0000001F,20220303
+-# A,0x00000F00,0x02000008,20070614
+-# A,0x00000F01,0x0000001C,20021031
+-# A,0x00000F10,0x00000003,20020325
+-# A,0x00000F11,0x0000001F,20030220
+-# A,0x00000F48,0x00000046,20040719
+-# A,0x00000F4A,0x00000047,20040719
+-# A,0x00000F50,0x00000024,20021212
+-# A,0x00000F51,0x00000025,20030115
+-# A,0x00010F50,0x00000041,20040225
+-# A,0x00020F10,0x0000004D,20050428
+-# A,0x00040F01,0xC0012102,20050916
+-# A,0x00040F0A,0x00000068,20060920
+-# A,0x00040F13,0x0000007A,20080508
+-# A,0x00040F14,0x00000062,20060127
+-# A,0x00040F1B,0x0000006D,20060920
+-# A,0x00040F33,0x0000007B,20080514
+-# A,0x00060F80,0x00000083,20060929
+-# A,0x000C0F1B,0x0000006E,20060921
+-# A,0x000F0F00,0x00000005,20020627
+-# A,0x000F0F01,0x00000015,20020627
+-# A,0x00100F00,0x01000020,20070326
+-# A,0x00100F20,0x010000CA,20100331
+-# A,0x00100F22,0x010000C9,20100331
+-# A,0x00100F40,0x01000085,20080501
+-# A,0x00100F41,0x010000DB,20111024
+-# A,0x00100F42,0x01000092,20081021
+-# A,0x00100F43,0x010000C8,20100311
+-# A,0x00100F62,0x010000C7,20100311
+-# A,0x00100F80,0x010000DA,20111024
+-# A,0x00100F81,0x010000D9,20111012
+-# A,0x00100FA0,0x010000DC,20111024
+-# A,0x00120F00,0x03000002,20100324
+-# A,0x00200F30,0x02000018,20070921
+-# A,0x00200F31,0x02000057,20080502
+-# A,0x00200F32,0x02000034,20080307
+-# A,0x00300F01,0x0300000E,20101004
+-# A,0x00300F10,0x03000027,20111309
+-# A,0x00500F00,0x0500000B,20100601
+-# A,0x00500F01,0x0500001A,20100908
+-# A,0x00500F10,0x05000029,20130121
+-# A,0x00500F20,0x05000119,20130118
+-# A,0x00580F00,0x0500000B,20100601
+-# A,0x00580F01,0x0500001A,20100908
+-# A,0x00580F10,0x05000028,20101124
+-# A,0x00580F20,0x05000103,20110526
+-# A,0x00600F00,0x06000017,20101029
+-# A,0x00600F01,0x0600011F,20110227
+-# A,0x00600F10,0x06000425,20110408
+-# A,0x00600F11,0x0600050D,20110627
+-# A,0x00600F12,0x0600063E,20180207
+-# A,0x00600F20,0x06000852,20180206
+-# A,0x00610F00,0x0600100E,20111102
+-# A,0x00610F01,0x0600111F,20180305
+-# A,0x00630F00,0x0600301C,20130817
+-# A,0x00630F01,0x06003109,20180227
+-# A,0x00660F00,0x06006012,20141014
+-# A,0x00660F01,0x0600611A,20180126
+-# A,0x00670F00,0x06006705,20180220
+-# A,0x00680F00,0x06000017,20101029
+-# A,0x00680F01,0x0600011F,20110227
+-# A,0x00680F10,0x06000410,20110314
+-# A,0x00690F00,0x06001009,20110613
+-# A,0x00700F00,0x0700002A,20121218
+-# A,0x00700F01,0x07000110,20180209
+-# A,0x00730F00,0x07030009,20131206
+-# A,0x00730F01,0x07030106,20180209
+-# A,0x00800F00,0x0800002A,20161006
+-# A,0x00800F10,0x0800100C,20170131
+-# A,0x00800F11,0x08001138,20190204
+-# A,0x00800F12,0x0800126E,20211111
+-# A,0x00800F82,0x0800820D,20190416
+-# A,0x00810F00,0x08100004,20161120
+-# A,0x00810F10,0x08101016,20190430
+-# A,0x00810F11,0x08101103,20190417
+-# A,0x00810F80,0x08108002,20180605
+-# A,0x00810F81,0x08108109,20190417
+-# A,0x00820F00,0x08200002,20180214
+-# A,0x00820F01,0x08200103,20190417
+-# A,0x00830F00,0x08300027,20190401
+-# A,0x00830F10,0x08301052,20211111
+-# A,0x00850F00,0x08500004,20180212
+-# A,0x00860F00,0x0860000E,20200127
+-# A,0x00860F01,0x08600106,20200619
+-# A,0x00860F81,0x08608103,20200702
+-# A,0x00870F00,0x08700004,20181206
+-# A,0x00870F10,0x08701021,20200125
+-# A,0x00A00F00,0x0A000033,20200413
+-# A,0x00A00F10,0x0A001053,20211217
+-# A,0x00A00F11,0x0A00115D,20211119
+-# A,0x00A00F12,0x0A001227,20211215
+-# A,0x00A00F80,0x0A008003,20211015
+-# A,0x00A00F82,0x0A008204,20211015
+-# A,0x00A20F00,0x0A200025,20200121
+-# A,0x00A20F10,0x0A201016,20210408
+-# A,0x00A20F12,0x0A201205,20210719
+-# A,0x00A50F00,0x0A50000C,20201208
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
new file mode 100644
index 0000000000..a2f13e4195
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
@@ -0,0 +1,1947 @@
+From 4dc8ae01aec5a8a2aa2afc015603261d514620ae Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Fri, 11 Nov 2022 18:49:50 +0800
+Subject: [PATCH 1/2] Stage commands for later substitution.
+
+awk, base64, basename, bunzip2, cat, cut, dd, dirname, dmesg, find, getent,
+grep, gunzip, gzip, head, id, lz4, lzop, mktemp, modprobe, mount, nm,
+nproc, objdump, od, perl, pgrep, readelf, rm, rmmod, sed, sort, stat,
+strings, sysctl, tr, umount, uname, unlzma, unxz, unzstd, uuencode, which,
+whoami, xargs.
+---
+ spectre-meltdown-checker.sh | 648 ++++++++++++++++++------------------
+ 1 file changed, 324 insertions(+), 324 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 30f760c..82cf1b6 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -19,33 +19,33 @@ trap '_warn "interrupted, cleaning up..."; exit_cleanup; exit 1' INT
+ exit_cleanup()
+ {
+ # cleanup the temp decompressed config & kernel image
+- [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm -f "$dumped_config"
+- [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm -f "$kerneltmp"
+- [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm -f "$kerneltmp2"
+- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm -f "$mcedb_tmp"
+- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm -rf "$intel_tmp"
+- [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug 2>/dev/null
+- [ "${mounted_procfs:-}" = 1 ] && umount "$procfs" 2>/dev/null
+- [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
+- [ "${insmod_msr:-}" = 1 ] && rmmod msr 2>/dev/null
++ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && @rm@ -f "$dumped_config"
++ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && @rm@ -f "$kerneltmp"
++ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && @rm@ -f "$kerneltmp2"
++ [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && @rm@ -f "$mcedb_tmp"
++ [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && @rm@ -rf "$intel_tmp"
++ [ "${mounted_debugfs:-}" = 1 ] && @umount@ /sys/kernel/debug 2>/dev/null
++ [ "${mounted_procfs:-}" = 1 ] && @umount@ "$procfs" 2>/dev/null
++ [ "${insmod_cpuid:-}" = 1 ] && @rmmod@ cpuid 2>/dev/null
++ [ "${insmod_msr:-}" = 1 ] && @rmmod@ msr 2>/dev/null
+ [ "${kldload_cpuctl:-}" = 1 ] && kldunload cpuctl 2>/dev/null
+ [ "${kldload_vmm:-}" = 1 ] && kldunload vmm 2>/dev/null
+ }
+
+ # if we were git clone'd, adjust VERSION
+-if [ -d "$(dirname "$0")/.git" ] && command -v git >/dev/null 2>&1; then
+- describe=$(git -C "$(dirname "$0")" describe --tags --dirty 2>/dev/null)
+- [ -n "$describe" ] && VERSION=$(echo "$describe" | sed -e s/^v//)
++if [ -d "$(@dirname@ "$0")/.git" ] && command -v git >/dev/null 2>&1; then
++ describe=$(git -C "$(@dirname@ "$0")" describe --tags --dirty 2>/dev/null)
++ [ -n "$describe" ] && VERSION=$(echo "$describe" | @sed@ -e s/^v//)
+ fi
+
+ show_usage()
+ {
+ # shellcheck disable=SC2086
+- cat <<EOF
++ @cat@ <<EOF
+ Usage:
+- Live mode (auto): $(basename $0) [options]
+- Live mode (manual): $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
+- Offline mode: $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
++ Live mode (auto): $(@basename@ $0) [options]
++ Live mode (manual): $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
++ Offline mode: $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
+
+ Modes:
+ Two modes are available.
+@@ -110,7 +110,7 @@ EOF
+
+ show_disclaimer()
+ {
+- cat <<EOF
++ @cat@ <<EOF
+ Disclaimer:
+
+ This tool does its best to determine whether your system is immune (or has proper mitigations in place) for the
+@@ -138,7 +138,7 @@ This tool has been released in the hope that it'll be useful, but don't use it t
+ EOF
+ }
+
+-os=$(uname -s)
++os=$(@uname@ -s)
+
+ # parse options
+ opt_kernel=''
+@@ -207,7 +207,7 @@ __echo()
+ _interpret_chars='-e'
+ fi
+ _ctrlchar=$($echo_cmd $_interpret_chars "\033")
+- _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
++ _msg=$($echo_cmd $_interpret_chars "$_msg" | @sed@ -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
+ fi
+ if [ "$echo_cmd_type" = printf ]; then
+ if [ "$opt" = "-n" ]; then
+@@ -383,7 +383,7 @@ is_cpu_affected()
+ # https://github.com/crozone/SpectrePoC/issues/1 ^F E5200 => spectre 2 not affected
+ # https://github.com/paboldin/meltdown-exploit/issues/19 ^F E5200 => meltdown affected
+ # model name : Pentium(R) Dual-Core CPU E5200 @ 2.50GHz
+- if echo "$cpu_friendly_name" | grep -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
++ if echo "$cpu_friendly_name" | @grep@ -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ variant3=vuln
+@@ -486,7 +486,7 @@ is_cpu_affected()
+ i=$(( i + 1 ))
+ # do NOT quote $cpu_arch_list below
+ # shellcheck disable=SC2086
+- cpuarch=$(echo $cpu_arch_list | awk '{ print $'$i' }')
++ cpuarch=$(echo $cpu_arch_list | @awk@ '{ print $'$i' }')
+ _debug "checking cpu$i: <$cpupart> <$cpuarch>"
+ # some kernels report AArch64 instead of 8
+ [ "$cpuarch" = "AArch64" ] && cpuarch=8
+@@ -497,49 +497,49 @@ is_cpu_affected()
+ # part ? ? c08 c09 c0d c0f c0e d07 d08 d09 d0a d0b d0c d0d
+ # arch 7? 7? 7 7 7 7 7 8 8 8 8 8 8 8
+ #
+- # Whitelist identified non-affected processors, use vulnerability information from
++ # Whitelist identified non-affected processors, use vulnerability information from
+ # https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
+ # Partnumbers can be found here:
+ # https://github.com/gcc-mirror/gcc/blob/master/gcc/config/arm/arm-cpus.in
+ #
+ # Maintain cumulative check of vulnerabilities -
+ # if at least one of the cpu is affected, then the system is affected
+- if [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
++ if [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A8/A9/A12/A17 non affected to variants 3, 3a & 4"
+- elif [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc0f; then
++ elif [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc0f; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A15 non affected to variants 3 & 4"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd07 -e 0xd08; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd07 -e 0xd08; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A57/A72 non affected to variants 3"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd09; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd09; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A73 non affected to variants 3 & 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0a; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0a; then
+ variant1=vuln
+ variant2=vuln
+ variant3=vuln
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A75 non affected to variant 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ [ -z "$variant3" ] && variant3=immune
+@@ -820,7 +820,7 @@ is_cpu_ssb_free()
+ if [ "$cpu_family" = "18" ] || \
+ [ "$cpu_family" = "17" ] || \
+ [ "$cpu_family" = "16" ] || \
+- [ "$cpu_family" = "15" ]; then
++ [ "$cpu_family" = "15" ]; then
+ return 0
+ fi
+ fi
+@@ -837,7 +837,7 @@ show_header()
+ _info
+ }
+
+-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
++[ -z "$HOME" ] && HOME="$(@getent@ passwd "$(@whoami@)" | @cut@ -d: -f6)"
+ mcedb_cache="$HOME/.mcedb"
+ update_fwdb()
+ {
+@@ -846,11 +846,11 @@ update_fwdb()
+ set -e
+
+ if [ -r "$mcedb_cache" ]; then
+- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
++ previous_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ fi
+
+ # first, download the MCE.db from the excellent platomav's MCExtractor project
+- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
++ mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
+ mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+ _info_nol "Fetching MCE.db from the MCExtractor project... "
+ if command -v wget >/dev/null 2>&1; then
+@@ -870,7 +870,7 @@ update_fwdb()
+ echo DONE
+
+ # second, get the Intel firmwares from GitHub
+- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
++ intel_tmp="$(@mktemp@ -d -t smc-intelfw-XXXXXX)"
+ intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+ _info_nol "Fetching Intel firmwares... "
+ ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+@@ -930,20 +930,20 @@ update_fwdb()
+ fi
+ # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev 0x0217, size 5120
+ # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev 0x0107, size 5120
+- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
++ $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | @grep@ -wF sig | while read -r _line
+ do
+- _line=$( echo "$_line" | tr -d ',')
+- _cpuid=$( echo "$_line" | awk '{print $3}')
++ _line=$( echo "$_line" | @tr@ -d ',')
++ _cpuid=$( echo "$_line" | @awk@ '{print $3}')
+ _cpuid=$(( _cpuid ))
+ _cpuid=$(printf "0x%08X" "$_cpuid")
+- _date=$( echo "$_line" | awk '{print $6}' | tr -d '-')
+- _version=$(echo "$_line" | awk '{print $8}')
++ _date=$( echo "$_line" | @awk@ '{print $6}' | @tr@ -d '-')
++ _version=$(echo "$_line" | @awk@ '{print $8}')
+ _version=$(( _version ))
+ _version=$(printf "0x%08X" "$_version")
+ _sqlstm="$(printf "INSERT INTO Intel (origin,cpuid,version,yyyymmdd) VALUES (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")" "$(printf "%08X" "$_version")" "$_date")"
+ sqlite3 "$mcedb_tmp" "$_sqlstm"
+ done
+- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
++ _intel_timestamp=$(@stat@ -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
+ if [ -n "$_intel_timestamp" ]; then
+ # use this date, it matches the last commit date
+ _intel_latest_date=$(date +%Y%m%d -d @"$_intel_timestamp")
+@@ -964,17 +964,17 @@ update_fwdb()
+ {
+ echo "# Spectre & Meltdown Checker";
+ echo "# %%% MCEDB v$dbversion";
+- sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
++ sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
++ sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
+ } > "$mcedb_cache"
+ echo DONE "(version $dbversion)"
+
+ if [ "$1" = builtin ]; then
+- newfile=$(mktemp -t smc-builtin-XXXXXX)
+- awk '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- awk '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- cat "$newfile" > "$0"
+- rm -f "$newfile"
++ newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
++ @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
++ @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
++ @cat@ "$newfile" > "$0"
++ @rm@ -f "$newfile"
+ fi
+ }
+
+@@ -1055,7 +1055,7 @@ while [ -n "${1:-}" ]; do
+ elif [ "$1" = "--cpu" ]; then
+ opt_cpu=$2
+ if [ "$opt_cpu" != all ]; then
+- if echo "$opt_cpu" | grep -Eq '^[0-9]+'; then
++ if echo "$opt_cpu" | @grep@ -Eq '^[0-9]+'; then
+ opt_cpu=$(( opt_cpu ))
+ else
+ echo "$0: error: --cpu should be an integer or 'all', got '$opt_cpu'" >&2
+@@ -1103,7 +1103,7 @@ while [ -n "${1:-}" ]; do
+ echo "$0: error: option --cve expects a parameter, supported CVEs are: $supported_cve_list" >&2
+ exit 255
+ fi
+- selected_cve=$(echo "$supported_cve_list" | grep -iwo "$2")
++ selected_cve=$(echo "$supported_cve_list" | @grep@ -iwo "$2")
+ if [ -n "$selected_cve" ]; then
+ opt_cve_list="$opt_cve_list $selected_cve"
+ opt_cve_all=0
+@@ -1308,14 +1308,14 @@ check_kernel()
+ # a damaged ELF file and validate it, check for stderr warnings too
+
+ # the warning "readelf: Warning: [16]: Link field (0) should index a symtab section./" can appear on valid kernels, ignore it
+- _readelf_warnings=$("${opt_arch_prefix}readelf" -S "$_file" 2>&1 >/dev/null | grep -v 'should index a symtab section' | tr "\n" "/"); ret=$?
+- _readelf_sections=$("${opt_arch_prefix}readelf" -S "$_file" 2>/dev/null | grep -c -e data -e text -e init)
+- _kernel_size=$(stat -c %s "$_file" 2>/dev/null || stat -f %z "$_file" 2>/dev/null || echo 10000)
++ _readelf_warnings=$("@readelf@" -S "$_file" 2>&1 >/dev/null | @grep@ -v 'should index a symtab section' | @tr@ "\n" "/"); ret=$?
++ _readelf_sections=$("@readelf@" -S "$_file" 2>/dev/null | @grep@ -c -e data -e text -e init)
++ _kernel_size=$(@stat@ -c %s "$_file" 2>/dev/null || @stat@ -f %z "$_file" 2>/dev/null || echo 10000)
+ _debug "check_kernel: ret=$? size=$_kernel_size sections=$_readelf_sections warnings=$_readelf_warnings"
+ if [ "$_mode" = desperate ]; then
+- if "${opt_arch_prefix}strings" "$_file" | grep -Eq '^Linux version '; then
++ if "@strings@" "$_file" | @grep@ -Eq '^Linux version '; then
+ _debug "check_kernel (desperate): ... matched!"
+- if [ "$_readelf_sections" = 0 ] && grep -qF -e armv6 -e armv7 "$_file"; then
++ if [ "$_readelf_sections" = 0 ] && @grep@ -qF -e armv6 -e armv7 "$_file"; then
+ _debug "check_kernel (desperate): raw arm binary found, adjusting objdump options"
+ objdump_options="-D -b binary -marm"
+ else
+@@ -1348,7 +1348,7 @@ try_decompress()
+
+ # Try to find the header ($1) and decompress from here
+ _debug "try_decompress: looking for $3 magic in $6"
+- for pos in $(tr "$1\n$2" "\n$2=" < "$6" | grep -abo "^$2")
++ for pos in $(@tr@ "$1\n$2" "\n$2=" < "$6" | @grep@ -abo "^$2")
+ do
+ _debug "try_decompress: magic for $3 found at offset $pos"
+ if ! command -v "$3" >/dev/null 2>&1; then
+@@ -1375,11 +1375,11 @@ try_decompress()
+ kernel="$kerneltmp"
+ _debug "try_decompress: decompressed with $3 successfully!"
+ return 0
+- elif [ "$3" != "cat" ]; then
++ elif [ "$3" != "@cat@" ]; then
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel, trying with an offset"
+- [ -z "$kerneltmp2" ] && kerneltmp2=$(mktemp -t smc-kernel-XXXXXX)
+- cat "$kerneltmp" > "$kerneltmp2"
+- try_decompress '\177ELF' xxy 'cat' '' cat "$kerneltmp2" && return 0
++ [ -z "$kerneltmp2" ] && kerneltmp2=$(@mktemp@ -t smc-kernel-XXXXXX)
++ @cat@ "$kerneltmp" > "$kerneltmp2"
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$kerneltmp2" && return 0
+ else
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel"
+ fi
+@@ -1391,12 +1391,12 @@ extract_kernel()
+ {
+ [ -n "${1:-}" ] || return 1
+ # Prepare temp files:
+- kerneltmp="$(mktemp -t smc-kernel-XXXXXX)"
++ kerneltmp="$(@mktemp@ -t smc-kernel-XXXXXX)"
+
+ # Initial attempt for uncompressed images or objects:
+ if check_kernel "$1"; then
+ _debug "extract_kernel: found kernel is valid, no decompression needed"
+- cat "$1" > "$kerneltmp"
++ @cat@ "$1" > "$kerneltmp"
+ kernel=$kerneltmp
+ return 0
+ fi
+@@ -1405,14 +1405,14 @@ extract_kernel()
+ for pass in 1 2; do
+ for mode in normal desperate; do
+ _debug "extract_kernel: pass $pass $mode mode"
+- try_decompress '\037\213\010' xy gunzip '' gunzip "$1" "$mode" "$pass" && return 0
+- try_decompress '\002\041\114\030' xyy 'lz4' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
+- try_decompress '\3757zXZ\000' abcde unxz '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress 'BZh' xy bunzip2 '' bzip2 "$1" "$mode" "$pass" && return 0
+- try_decompress '\135\0\0\0' xxx unlzma '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress '\211\114\132' xy 'lzop' '-d' lzop "$1" "$mode" "$pass" && return 0
+- try_decompress '\177ELF' xxy 'cat' '' cat "$1" "$mode" "$pass" && return 0
+- try_decompress '(\265/\375' xxy unzstd '' zstd "$1" "$mode" "$pass" && return 0
++ try_decompress '\037\213\010' xy @gunzip@ '' gunzip "$1" "$mode" "$pass" && return 0
++ try_decompress '\002\041\114\030' xyy '@lz4@' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
++ try_decompress '\3757zXZ\000' abcde @unxz@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress 'BZh' xy @bunzip2@ '' bzip2 "$1" "$mode" "$pass" && return 0
++ try_decompress '\135\0\0\0' xxx @unlzma@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress '\211\114\132' xy '@lzop@' '-d' lzop "$1" "$mode" "$pass" && return 0
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$1" "$mode" "$pass" && return 0
++ try_decompress '(\265/\375' xxy @unzstd@ '' zstd "$1" "$mode" "$pass" && return 0
+ done
+ done
+ # kernel_err might already have been populated by try_decompress() if we're missing one of the tools
+@@ -1429,7 +1429,7 @@ mount_debugfs()
+ {
+ if [ ! -e /sys/kernel/debug/sched_features ]; then
+ # try to mount the debugfs hierarchy ourselves and remember it to umount afterwards
+- mount -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
++ @mount@ -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
+ fi
+ }
+
+@@ -1440,12 +1440,12 @@ load_msr()
+ load_msr_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw msr "$procfs/modules" 2>/dev/null; then
+- modprobe msr 2>/dev/null && insmod_msr=1
++ if ! @grep@ -qw msr "$procfs/modules" 2>/dev/null; then
++ @modprobe@ msr 2>/dev/null && insmod_msr=1
+ _debug "attempted to load module msr, insmod_msr=$insmod_msr"
+ else
+ _debug "msr module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1463,12 +1463,12 @@ load_cpuid()
+ load_cpuid_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw cpuid "$procfs/modules" 2>/dev/null; then
+- modprobe cpuid 2>/dev/null && insmod_cpuid=1
++ if ! @grep@ -qw cpuid "$procfs/modules" 2>/dev/null; then
++ @modprobe@ cpuid 2>/dev/null && insmod_cpuid=1
+ _debug "attempted to load module cpuid, insmod_cpuid=$insmod_cpuid"
+ else
+ _debug "cpuid module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1557,7 +1557,7 @@ read_cpuid_one_core()
+ fi
+ # on some kernel versions, /dev/cpu/0/cpuid doesn't imply that the cpuid module is loaded, in that case dd returns an error,
+ # we use that fact to load the module if dd returns an error
+- if ! dd if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
++ if ! @dd@ if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
+ load_cpuid
+ fi
+ # we need _leaf to be converted to decimal for dd
+@@ -1568,14 +1568,14 @@ read_cpuid_one_core()
+ _ddskip=$(( _position / 16 ))
+ _odskip=$(( _position - _ddskip * 16 ))
+ # now read the value
+- _cpuid=$(dd if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | od -j $((_odskip * 16)) -A n -t u4)
++ _cpuid=$(@dd@ if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | @od@ -j $((_odskip * 16)) -A n -t u4)
+ elif [ -e /dev/cpuctl0 ]; then
+ # BSD
+ if [ ! -r /dev/cpuctl0 ]; then
+ read_cpuid_msg="Couldn't read cpuid info from cpuctl"
+ return $READ_CPUID_RET_ERR
+ fi
+- _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | cut -d: -f2-)
++ _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | @cut@ -d: -f2-)
+ # cpuid level 0x4, level_type 0x2: 0x1c004143 0x01c0003f 0x000001ff 0x00000000
+ else
+ read_cpuid_msg="Found no way to read cpuid info"
+@@ -1598,7 +1598,7 @@ read_cpuid_one_core()
+ fi
+
+ # get the value of the register we want
+- _reg=$(echo "$_cpuid" | awk '{print $'"$_register"'}')
++ _reg=$(echo "$_cpuid" | @awk@ '{print $'"$_register"'}')
+ # Linux returns it as decimal, BSD as hex, normalize to decimal
+ _reg=$(( _reg ))
+ # shellcheck disable=SC2046
+@@ -1626,11 +1626,11 @@ dmesg_grep()
+ # grep for something in dmesg, ensuring that the dmesg buffer
+ # has not been truncated
+ dmesg_grepped=''
+- if ! dmesg | grep -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
++ if ! @dmesg@ | @grep@ -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
+ # dmesg truncated
+ return 2
+ fi
+- dmesg_grepped=$(dmesg | grep -E "$1" | head -1)
++ dmesg_grepped=$(@dmesg@ | @grep@ -E "$1" | @head@ -1)
+ # not found:
+ [ -z "$dmesg_grepped" ] && return 1
+ # found, output is in $dmesg_grepped
+@@ -1647,12 +1647,12 @@ parse_cpu_details()
+ {
+ [ "${parse_cpu_details_done:-}" = 1 ] && return 0
+
+- if command -v nproc >/dev/null; then
+- number_of_cores=$(nproc)
+- elif echo "$os" | grep -q BSD; then
+- number_of_cores=$(sysctl -n hw.ncpu 2>/dev/null || echo 1)
++ if command -v @nproc@ >/dev/null; then
++ number_of_cores=$(@nproc@)
++ elif echo "$os" | @grep@ -q BSD; then
++ number_of_cores=$(@sysctl@ -n hw.ncpu 2>/dev/null || echo 1)
+ elif [ -e "$procfs/cpuinfo" ]; then
+- number_of_cores=$(grep -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
++ number_of_cores=$(@grep@ -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
+ else
+ # if we don't know, default to 1 CPU
+ number_of_cores=1
+@@ -1660,43 +1660,43 @@ parse_cpu_details()
+ max_core_id=$(( number_of_cores - 1 ))
+
+ if [ -e "$procfs/cpuinfo" ]; then
+- cpu_vendor=$( grep '^vendor_id' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
+- cpu_friendly_name=$(grep '^model name' "$procfs/cpuinfo" | cut -d: -f2- | head -1 | sed -e 's/^ *//')
++ cpu_vendor=$( @grep@ '^vendor_id' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
++ cpu_friendly_name=$(@grep@ '^model name' "$procfs/cpuinfo" | @cut@ -d: -f2- | @head@ -1 | @sed@ -e 's/^ *//')
+ # special case for ARM follows
+- if grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
++ if @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
+ cpu_vendor='ARM'
+ # some devices (phones or other) have several ARMs and as such different part numbers,
+ # an example is "bigLITTLE", so we need to store the whole list, this is needed for is_cpu_affected
+- cpu_part_list=$(awk '/CPU part/ {print $4}' "$procfs/cpuinfo")
+- cpu_arch_list=$(awk '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
++ cpu_part_list=$(@awk@ '/CPU part/ {print $4}' "$procfs/cpuinfo")
++ cpu_arch_list=$(@awk@ '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
+ # take the first one to fill the friendly name, do NOT quote the vars below
+ # shellcheck disable=SC2086
+- cpu_arch=$(echo $cpu_arch_list | awk '{ print $1 }')
++ cpu_arch=$(echo $cpu_arch_list | @awk@ '{ print $1 }')
+ # shellcheck disable=SC2086
+- cpu_part=$(echo $cpu_part_list | awk '{ print $1 }')
++ cpu_part=$(echo $cpu_part_list | @awk@ '{ print $1 }')
+ [ "$cpu_arch" = "AArch64" ] && cpu_arch=8
+ cpu_friendly_name="ARM"
+ [ -n "$cpu_arch" ] && cpu_friendly_name="$cpu_friendly_name v$cpu_arch"
+ [ -n "$cpu_part" ] && cpu_friendly_name="$cpu_friendly_name model $cpu_part"
+
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
+ cpu_vendor='CAVIUM'
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
+ cpu_vendor='PHYTIUM'
+ fi
+
+- cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" | awk '{print $4}' | grep -E '^[0-9]+$' | head -1)
+- cpu_model=$( grep '^model' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_stepping=$(grep '^stepping' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_ucode=$( grep '^microcode' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
++ cpu_family=$( @grep@ '^cpu family' "$procfs/cpuinfo" | @awk@ '{print $4}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_model=$( @grep@ '^model' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_stepping=$(@grep@ '^stepping' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_ucode=$( @grep@ '^microcode' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
+ else
+- cpu_vendor=$( dmesg | grep -i -m1 'Origin=' | cut -f2 -w | cut -f2 -d= | cut -f2 -d\" )
+- cpu_family=$( dmesg | grep -i -m1 'Family=' | cut -f4 -w | cut -f2 -d= )
++ cpu_vendor=$( @dmesg@ | @grep@ -i -m1 'Origin=' | @cut@ -f2 -w | @cut@ -f2 -d= | @cut@ -f2 -d\" )
++ cpu_family=$( @dmesg@ | @grep@ -i -m1 'Family=' | @cut@ -f4 -w | @cut@ -f2 -d= )
+ cpu_family=$(( cpu_family ))
+- cpu_model=$( dmesg | grep -i -m1 'Model=' | cut -f5 -w | cut -f2 -d= )
++ cpu_model=$( @dmesg@ | @grep@ -i -m1 'Model=' | @cut@ -f5 -w | @cut@ -f2 -d= )
+ cpu_model=$(( cpu_model ))
+- cpu_stepping=$( dmesg | grep -i -m1 'Stepping=' | cut -f6 -w | cut -f2 -d= )
+- cpu_friendly_name=$(sysctl -n hw.model 2>/dev/null)
++ cpu_stepping=$( @dmesg@ | @grep@ -i -m1 'Stepping=' | @cut@ -f6 -w | @cut@ -f2 -d= )
++ cpu_friendly_name=$(@sysctl@ -n hw.model 2>/dev/null)
+ fi
+
+ if [ -n "${SMC_MOCK_CPU_FRIENDLY_NAME:-}" ]; then
+@@ -1751,7 +1751,7 @@ parse_cpu_details()
+ # call CPUID
+ cpucontrol -i 1 /dev/cpuctl0 >/dev/null
+ # read MSR
+- cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | awk '{print $3}')
++ cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | @awk@ '{print $3}')
+ # convert to decimal
+ cpu_ucode=$(( cpu_ucode ))
+ # convert back to hex
+@@ -1770,7 +1770,7 @@ parse_cpu_details()
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CPU_UCODE='$cpu_ucode'")
+ fi
+
+- echo "$cpu_ucode" | grep -q ^0x && cpu_ucode=$(( cpu_ucode ))
++ echo "$cpu_ucode" | @grep@ -q ^0x && cpu_ucode=$(( cpu_ucode ))
+ ucode_found=$(printf "family 0x%x model 0x%x stepping 0x%x ucode 0x%x cpuid 0x%x" "$cpu_family" "$cpu_model" "$cpu_stepping" "$cpu_ucode" "$cpu_cpuid")
+
+ # also define those that we will need in other funcs
+@@ -1867,8 +1867,8 @@ is_cpu_smt_enabled()
+ {
+ # SMT / HyperThreading is enabled if siblings != cpucores
+ if [ -e "$procfs/cpuinfo" ]; then
+- _siblings=$(awk '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
+- _cpucores=$(awk '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
++ _siblings=$(@awk@ '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
++ _cpucores=$(@awk@ '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
+ if [ -n "$_siblings" ] && [ -n "$_cpucores" ]; then
+ if [ "$_siblings" = "$_cpucores" ]; then
+ return 1
+@@ -1916,10 +1916,10 @@ is_ucode_blacklisted()
+ $INTEL_FAM6_SANDYBRIDGE_X,0x06,0x61b \
+ $INTEL_FAM6_SANDYBRIDGE_X,0x07,0x712
+ do
+- model=$(echo "$tuple" | cut -d, -f1)
+- stepping=$(( $(echo "$tuple" | cut -d, -f2) ))
++ model=$(echo "$tuple" | @cut@ -d, -f1)
++ stepping=$(( $(echo "$tuple" | @cut@ -d, -f2) ))
+ if [ "$cpu_model" = "$model" ] && [ "$cpu_stepping" = "$stepping" ]; then
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
+ if [ "$cpu_ucode" = "$ucode" ]; then
+ _debug "is_ucode_blacklisted: we have a match! ($cpu_model/$cpu_stepping/$cpu_ucode)"
+ return 0
+@@ -2007,7 +2007,7 @@ is_xen_dom0()
+ return 1
+ fi
+
+- if [ -e "$procfs/xen/capabilities" ] && grep -q "control_d" "$procfs/xen/capabilities"; then
++ if [ -e "$procfs/xen/capabilities" ] && @grep@ -q "control_d" "$procfs/xen/capabilities"; then
+ return 0
+ else
+ return 1
+@@ -2033,12 +2033,12 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
++builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+- local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
++ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | sort -V | head -n1)
++ older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | @sort@ -V | @head@ -n1)
+ if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+ mcedb_source="$mcedb_cache"
+ mcedb_info="local firmwares DB $local_dbversion"
+@@ -2051,7 +2051,7 @@ if [ -z "${mcedb_source:-}" ]; then
+ fi
+ read_mcedb()
+ {
+- awk '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
++ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
+ }
+
+ is_latest_known_ucode()
+@@ -2070,10 +2070,10 @@ is_latest_known_ucode()
+ else
+ return 2
+ fi
+- for tuple in $(read_mcedb | grep "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
++ for tuple in $(read_mcedb | @grep@ "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
+ do
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
+- ucode_date=$(echo "$tuple" | cut -d, -f4 | sed -r 's=(....)(..)(..)=\1/\2/\3=')
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
++ ucode_date=$(echo "$tuple" | @cut@ -d, -f4 | @sed@ -r 's=(....)(..)(..)=\1/\2/\3=')
+ _debug "is_latest_known_ucode: with cpuid $cpu_cpuid has ucode $cpu_ucode, last known is $ucode from $ucode_date"
+ ucode_latest=$(printf "latest version is 0x%x dated $ucode_date according to $mcedb_info" "$ucode")
+ if [ "$cpu_ucode" -ge "$ucode" ]; then
+@@ -2098,7 +2098,7 @@ get_cmdline()
+ kernel_cmdline="$SMC_MOCK_CMDLINE"
+ return
+ else
+- kernel_cmdline=$(cat "$procfs/cmdline")
++ kernel_cmdline=$(@cat@ "$procfs/cmdline")
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CMDLINE='$kernel_cmdline'")
+ fi
+ }
+@@ -2106,7 +2106,7 @@ get_cmdline()
+ # ENTRYPOINT
+
+ # we can't do anything useful under WSL
+-if uname -a | grep -qE -- '-Microsoft #[0-9]+-Microsoft '; then
++if @uname@ -a | @grep@ -qE -- '-Microsoft #[0-9]+-Microsoft '; then
+ _warn "This script doesn't work under Windows Subsystem for Linux"
+ _warn "You should use the official Microsoft tool instead."
+ _warn "It can be found under https://aka.ms/SpeculationControlPS"
+@@ -2155,15 +2155,15 @@ fi
+
+ # if we're under a BSD, try to mount linprocfs for "$procfs/cpuinfo"
+ procfs=/proc
+-if echo "$os" | grep -q BSD; then
++if echo "$os" | @grep@ -q BSD; then
+ _debug "We're under BSD, check if we have procfs"
+- procfs=$(mount | awk '/^linprocfs/ { print $3; exit; }')
++ procfs=$(@mount@ | @awk@ '/^linprocfs/ { print $3; exit; }')
+ if [ -z "$procfs" ]; then
+ _debug "we don't, try to mount it"
+ procfs=/proc
+ [ -d /compat/linux/proc ] && procfs=/compat/linux/proc
+ test -d $procfs || mkdir $procfs
+- if mount -t linprocfs linprocfs $procfs 2>/dev/null; then
++ if @mount@ -t linprocfs linprocfs $procfs 2>/dev/null; then
+ mounted_procfs=1
+ _debug "procfs just mounted at $procfs"
+ else
+@@ -2195,14 +2195,14 @@ fi
+
+ if [ "$opt_live" = 1 ]; then
+ # root check (only for live mode, for offline mode, we already checked if we could read the files)
+- if [ "$(id -u)" -ne 0 ]; then
++ if [ "$(@id@ -u)" -ne 0 ]; then
+ _warn "Note that you should launch this script with root privileges to get accurate information."
+ _warn "We'll proceed but you might see permission denied errors."
+ _warn "To run it as root, you can try the following command: sudo $0"
+ _warn
+ fi
+ _info "Checking for vulnerabilities on current system"
+- _info "Kernel is \033[35m$os $(uname -r) $(uname -v) $(uname -m)\033[0m"
++ _info "Kernel is \033[35m$os $(@uname@ -r) $(@uname@ -v) $(@uname@ -m)\033[0m"
+ _info "CPU is \033[35m$cpu_friendly_name\033[0m"
+
+ # try to find the image of the current running kernel
+@@ -2210,12 +2210,12 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ # first, look for the BOOT_IMAGE hint in the kernel cmdline
+- elif echo "$kernel_cmdline" | grep -q 'BOOT_IMAGE='; then
+- opt_kernel=$(echo "$kernel_cmdline" | grep -Eo 'BOOT_IMAGE=[^ ]+' | cut -d= -f2)
++ elif echo "$kernel_cmdline" | @grep@ -q 'BOOT_IMAGE='; then
++ opt_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo 'BOOT_IMAGE=[^ ]+' | @cut@ -d= -f2)
+ _debug "found opt_kernel=$opt_kernel in $procfs/cmdline"
+ # if the boot partition is within a btrfs subvolume, strip the subvolume name
+ # if /boot is a separate subvolume, the remainder of the code in this section should handle it
+- if echo "$opt_kernel" | grep -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | sed "s:/@[^/]*::"); fi
++ if echo "$opt_kernel" | @grep@ -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | @sed@ "s:/@[^/]*::"); fi
+ # if we have a dedicated /boot partition, our bootloader might have just called it /
+ # so try to prepend /boot and see if we find anything
+ [ -e "/boot/$opt_kernel" ] && opt_kernel="/boot/$opt_kernel"
+@@ -2227,7 +2227,7 @@ if [ "$opt_live" = 1 ]; then
+ # if we didn't find a kernel, default to guessing
+ if [ ! -e "$opt_kernel" ]; then
+ # Fedora:
+- [ -e "/lib/modules/$(uname -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(uname -r)/vmlinuz"
++ [ -e "/lib/modules/$(@uname@ -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(@uname@ -r)/vmlinuz"
+ # Slackware:
+ [ -e "/boot/vmlinuz" ] && opt_kernel="/boot/vmlinuz"
+ # Arch aarch64:
+@@ -2241,24 +2241,24 @@ if [ "$opt_live" = 1 ]; then
+ # pine64
+ [ -e "/boot/pine64/Image" ] && opt_kernel="/boot/pine64/Image"
+ # generic:
+- [ -e "/boot/vmlinuz-$(uname -r)" ] && opt_kernel="/boot/vmlinuz-$(uname -r)"
+- [ -e "/boot/kernel-$( uname -r)" ] && opt_kernel="/boot/kernel-$( uname -r)"
+- [ -e "/boot/bzImage-$(uname -r)" ] && opt_kernel="/boot/bzImage-$(uname -r)"
++ [ -e "/boot/vmlinuz-$(@uname@ -r)" ] && opt_kernel="/boot/vmlinuz-$(@uname@ -r)"
++ [ -e "/boot/kernel-$( @uname@ -r)" ] && opt_kernel="/boot/kernel-$( @uname@ -r)"
++ [ -e "/boot/bzImage-$(@uname@ -r)" ] && opt_kernel="/boot/bzImage-$(@uname@ -r)"
+ # Gentoo:
+- [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
++ [ -e "/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)" ] && opt_kernel="/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
+ # Guix System:
+ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+- [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
++ [ -e "/etc/machine-id" ] && [ -e "/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux" ] && opt_kernel="/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux"
+ # Clear Linux:
+- str_uname=$(uname -r)
++ str_uname=$(@uname@ -r)
+ clear_linux_kernel="/lib/kernel/org.clearlinux.${str_uname##*.}.${str_uname%.*}"
+ [ -e "$clear_linux_kernel" ] && opt_kernel=$clear_linux_kernel
+ # Custom Arch seems to have the kernel path in its cmdline in the form "\directory\kernelimage",
+ # with actual \'s instead of /'s:
+- custom_arch_kernel=$(echo "$kernel_cmdline" | grep -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | tr "\\\\" "/" | tr -d '[:space:]')
++ custom_arch_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | @tr@ "\\\\" "/" | @tr@ -d '[:space:]')
+ if [ -n "$custom_arch_kernel" ] && [ -e "$custom_arch_kernel" ]; then
+ opt_kernel="$custom_arch_kernel"
+ fi
+@@ -2272,12 +2272,12 @@ if [ "$opt_live" = 1 ]; then
+ :
+ elif [ -e "$procfs/kallsyms" ] ; then
+ opt_map="$procfs/kallsyms"
+- elif [ -e "/lib/modules/$(uname -r)/System.map" ] ; then
+- opt_map="/lib/modules/$(uname -r)/System.map"
+- elif [ -e "/boot/System.map-$(uname -r)" ] ; then
+- opt_map="/boot/System.map-$(uname -r)"
+- elif [ -e "/lib/kernel/System.map-$(uname -r)" ]; then
+- opt_map="/lib/kernel/System.map-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/System.map" ] ; then
++ opt_map="/lib/modules/$(@uname@ -r)/System.map"
++ elif [ -e "/boot/System.map-$(@uname@ -r)" ] ; then
++ opt_map="/boot/System.map-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/System.map-$(@uname@ -r)" ]; then
++ opt_map="/lib/kernel/System.map-$(@uname@ -r)"
+ fi
+
+ # config
+@@ -2285,18 +2285,18 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ elif [ -e "$procfs/config.gz" ] ; then
+- dumped_config="$(mktemp -t smc-config-XXXXXX)"
+- gunzip -c "$procfs/config.gz" > "$dumped_config"
++ dumped_config="$(@mktemp@ -t smc-config-XXXXXX)"
++ @gunzip@ -c "$procfs/config.gz" > "$dumped_config"
+ # dumped_config will be deleted at the end of the script
+ opt_config="$dumped_config"
+- elif [ -e "/lib/modules/$(uname -r)/config" ]; then
+- opt_config="/lib/modules/$(uname -r)/config"
+- elif [ -e "/boot/config-$(uname -r)" ]; then
+- opt_config="/boot/config-$(uname -r)"
+- elif [ -e "/etc/kernels/kernel-config-$(uname -m)-$(uname -r)" ]; then
+- opt_config="/etc/kernels/kernel-config-$(uname -m)-$(uname -r)"
+- elif [ -e "/lib/kernel/config-$(uname -r)" ]; then
+- opt_config="/lib/kernel/config-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/config" ]; then
++ opt_config="/lib/modules/$(@uname@ -r)/config"
++ elif [ -e "/boot/config-$(@uname@ -r)" ]; then
++ opt_config="/boot/config-$(@uname@ -r)"
++ elif [ -e "/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)" ]; then
++ opt_config="/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/config-$(@uname@ -r)" ]; then
++ opt_config="/lib/kernel/config-$(@uname@ -r)"
+ fi
+ else
+ _info "Checking for vulnerabilities against specified kernel"
+@@ -2311,7 +2311,7 @@ else
+ fi
+
+ if [ "$os" = Linux ]; then
+- if [ -n "$opt_config" ] && ! grep -q '^CONFIG_' "$opt_config"; then
++ if [ -n "$opt_config" ] && ! @grep@ -q '^CONFIG_' "$opt_config"; then
+ # given file is invalid!
+ _warn "The kernel config file seems invalid, was expecting a plain-text file, ignoring it!"
+ opt_config=''
+@@ -2339,7 +2339,7 @@ if [ "$os" = Linux ]; then
+ fi
+
+ if [ -e "$opt_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ _debug "readelf not found"
+ kernel_err="missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the 'binutils' package"
+ elif [ "$opt_sysfs_only" = 1 ] || [ "$opt_hw_only" = 1 ]; then
+@@ -2357,20 +2357,20 @@ else
+ # vanilla kernels have with ^Linux version
+ # also try harder with some kernels (such as Red Hat) that don't have ^Linux version before their version string
+ # and check for FreeBSD
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E \
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E \
+ -e '^Linux version ' \
+ -e '^[[:alnum:]][^[:space:]]+ \([^[:space:]]+\) #[0-9]+ .+ (19|20)[0-9][0-9]$' \
+- -e '^FreeBSD [0-9]' | head -1)
++ -e '^FreeBSD [0-9]' | @head@ -1)
+ if [ -z "$kernel_version" ]; then
+ # try even harder with some kernels (such as ARM) that split the release (uname -r) and version (uname -v) in 2 adjacent strings
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | tr "\n" " ")
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | @tr@ "\n" " ")
+ fi
+ if [ -n "$kernel_version" ]; then
+ # in live mode, check if the img we found is the correct one
+ if [ "$opt_live" = 1 ]; then
+ _verbose "Kernel image is \033[35m$kernel_version"
+- if ! echo "$kernel_version" | grep -qF "$(uname -r)"; then
+- _warn "Possible discrepancy between your running kernel '$(uname -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
++ if ! echo "$kernel_version" | @grep@ -qF "$(@uname@ -r)"; then
++ _warn "Possible discrepancy between your running kernel '$(@uname@ -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
+ fi
+ else
+ _info "Kernel image is \033[35m$kernel_version"
+@@ -2398,11 +2398,11 @@ sys_interface_check()
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" = 0 ] && [ -r "$file" ]; then
+ :
+ else
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")_RET=1")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")_RET=1")
+ return 1
+ fi
+
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")_RET"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")_RET"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ _debug "sysfs: MOCKING enabled for $file func returns $(eval echo \$$_mockvarname)"
+@@ -2411,17 +2411,17 @@ sys_interface_check()
+ fi
+
+ [ -n "$regex" ] || regex='.*'
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ fullmsg="$(eval echo \$$_mockvarname)"
+- msg=$(echo "$fullmsg" | grep -Eo "$regex")
++ msg=$(echo "$fullmsg" | @grep@ -Eo "$regex")
+ _debug "sysfs: MOCKING enabled for $file, will return $fullmsg"
+ mocked=1
+ else
+- fullmsg=$(cat "$file")
+- msg=$(grep -Eo "$regex" "$file")
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")='$fullmsg'")
++ fullmsg=$(@cat@ "$file")
++ msg=$(@grep@ -Eo "$regex" "$file")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")='$fullmsg'")
+ fi
+ if [ "$mode" = silent ]; then
+ return 0
+@@ -2430,15 +2430,15 @@ sys_interface_check()
+ return 0
+ fi
+ _info_nol "* Mitigated according to the /sys interface: "
+- if echo "$msg" | grep -qi '^not affected'; then
++ if echo "$msg" | @grep@ -qi '^not affected'; then
+ # Not affected
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qEi '^(kvm: )?mitigation'; then
++ elif echo "$msg" | @grep@ -qEi '^(kvm: )?mitigation'; then
+ # Mitigation: PTI
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qi '^vulnerable'; then
++ elif echo "$msg" | @grep@ -qi '^vulnerable'; then
+ # Vulnerable
+ status=VULN
+ pstatus yellow NO "$fullmsg"
+@@ -2526,20 +2526,20 @@ write_msr_one_core()
+ # ret=4: msr doesn't exist, ret=127: msr.allow_writes=off
+ [ "$ret" = 127 ] && _write_denied=1
+ # or fallback to dd if it supports seek_bytes, we prefer it over perl because we can tell the difference between EPERM and EIO
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
+ _debug "write_msr: using dd"
+- dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
++ @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
+ # if it failed, inspect stderrto look for EPERM
+ if [ "$ret" != 0 ]; then
+- if dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | grep -qF 'Operation not permitted'; then
++ if @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | @grep@ -qF 'Operation not permitted'; then
+ _write_denied=1
+ fi
+ fi
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "write_msr: using perl"
+ ret=1
+- perl -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
++ @perl@ -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
+ else
+ _debug "write_msr: got no wrmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_ERR")
+@@ -2561,13 +2561,13 @@ write_msr_one_core()
+ msr_locked_down=1
+ write_msr_msg="your kernel is configured to deny writes to MSRs from user space"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "msr: Direct access to MSR"; then
++ elif @dmesg@ | @grep@ -qF "msr: Direct access to MSR"; then
+ _debug "write_msr: locked down kernel detected (Red Hat / Fedora)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+ write_msr_msg="your kernel is locked down (Fedora/Red Hat), please reboot without secure boot and retry"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "raw MSR access is restricted"; then
++ elif @dmesg@ | @grep@ -qF "raw MSR access is restricted"; then
+ _debug "write_msr: locked down kernel detected (vanilla)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+@@ -2666,8 +2666,8 @@ read_msr_one_core()
+ return $READ_MSR_RET_KO
+ fi
+ # MSR 0x10: 0x000003e1 0xb106dded
+- _msr_h=$(echo "$_msr" | awk '{print $3}');
+- _msr_l=$(echo "$_msr" | awk '{print $4}');
++ _msr_h=$(echo "$_msr" | @awk@ '{print $3}');
++ _msr_l=$(echo "$_msr" | @awk@ '{print $4}');
+ read_msr_value=$(( _msr_h << 32 | _msr_l ))
+ else
+ # for Linux
+@@ -2678,15 +2678,15 @@ read_msr_one_core()
+ # if rdmsr is available, use it
+ elif command -v rdmsr >/dev/null 2>&1 && [ "${SMC_NO_RDMSR:-}" != 1 ]; then
+ _debug "read_msr: using rdmsr on $_msr"
+- read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | @od@ -t u8 -A n)
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "read_msr: using perl on $_msr"
+- read_msr_value=$(perl -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | od -t u8 -A n)
++ read_msr_value=$(@perl@ -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | @od@ -t u8 -A n)
+ # fallback to dd if it supports skip_bytes
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
+ _debug "read_msr: using dd on $_msr"
+- read_msr_value=$(dd if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(@dd@ if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | @od@ -t u8 -A n)
+ else
+ _debug "read_msr: got no rdmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_RDMSR_${_msr}_RET=$READ_MSR_RET_ERR")
+@@ -2710,7 +2710,7 @@ check_cpu()
+ {
+ _info "\033[1;34mHardware check\033[0m"
+
+- if ! uname -m | grep -qwE 'x86_64|i[3-6]86|amd64'; then
++ if ! @uname@ -m | @grep@ -qwE 'x86_64|i[3-6]86|amd64'; then
+ return
+ fi
+
+@@ -3326,19 +3326,19 @@ check_redhat_canonical_spectre()
+ # if we were already called, don't do it again
+ [ -n "${redhat_canonical_spectre:-}" ] && return
+
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ redhat_canonical_spectre=-1
+ elif [ -n "$kernel_err" ]; then
+ redhat_canonical_spectre=-2
+ else
+ # Red Hat / Ubuntu specific variant1 patch is difficult to detect,
+ # let's use the two same tricks than the official Red Hat detection script uses:
+- if "${opt_arch_prefix}strings" "$kernel" | grep -qw noibrs && "${opt_arch_prefix}strings" "$kernel" | grep -qw noibpb; then
++ if "@strings@" "$kernel" | @grep@ -qw noibrs && "@strings@" "$kernel" | @grep@ -qw noibpb; then
+ # 1) detect their specific variant2 patch. If it's present, it means
+ # that the variant1 patch is also present (both were merged at the same time)
+ _debug "found redhat/canonical version of the variant2 patch (implies variant1)"
+ redhat_canonical_spectre=1
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'x86/pti:'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'x86/pti:'; then
+ # 2) detect their specific variant3 patch. If it's present, but the variant2
+ # is not, it means that only variant1 is present in addition to variant3
+ _debug "found redhat/canonical version of the variant3 patch (implies variant1 but not variant2)"
+@@ -3363,13 +3363,13 @@ check_has_vmm()
+ # If we find no evidence that this is the case, assume we're not (to avoid scaring users),
+ # this can always be overridden with --vmm in any case.
+ has_vmm=0
+- if command -v pgrep >/dev/null 2>&1; then
++ if command -v @pgrep@ >/dev/null 2>&1; then
+ # remove xenbus and xenwatch, also present inside domU
+ # remove libvirtd as it can also be used to manage containers and not VMs
+ # for each binary we want to grep, get the pids
+ for _binary in qemu kvm xenstored xenconsoled
+ do
+- for _pid in $(pgrep -x $_binary)
++ for _pid in $(@pgrep@ -x $_binary)
+ do
+ # resolve the exe symlink, if it doesn't resolve with -m,
+ # which doesn't even need the dest to exist, it means the symlink
+@@ -3385,7 +3385,7 @@ check_has_vmm()
+ else
+ # ignore SC2009 as `ps ax` is actually used as a fallback if `pgrep` isn't installed
+ # shellcheck disable=SC2009
+- if command -v ps >/devnull && ps ax | grep -vw grep | grep -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
++ if command -v ps >/devnull && ps ax | @grep@ -vw grep | @grep@ -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
+ has_vmm=1
+ fi
+ fi
+@@ -3417,7 +3417,7 @@ check_CVE_2017_5753()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5753_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5753_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3469,20 +3469,20 @@ check_CVE_2017_5753_linux()
+ v1_mask_nospec=''
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+ else
+- perl -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 64 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 64 bits array_index_mask_nospec"
+ else
+- perl -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 32 bits array_index_mask_nospec"
+ else
+- ret=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" | grep -w -e f3af8014 -e e320f014 -B2 | grep -B1 -w sbc | grep -w -c cmp)
++ ret=$("@objdump@" $objdump_options "$kernel" | @grep@ -w -e f3af8014 -e e320f014 -B2 | @grep@ -B1 -w sbc | @grep@ -w -c cmp)
+ if [ "$ret" -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of arm 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="arm 32 bits array_index_mask_nospec"
+@@ -3526,12 +3526,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" $objdump_options "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" $objdump_options "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "mask_nospec64 macro is present and used"
+ v1_mask_nospec="arm64 mask_nospec64"
+@@ -3553,12 +3553,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" -d "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" -d "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "array_index_nospec macro is present and used"
+ v1_mask_nospec="arm64 array_index_nospec"
+@@ -3574,7 +3574,7 @@ check_CVE_2017_5753_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ if ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+ # here we disassemble the kernel and count the number of occurrences of the LFENCE opcode
+@@ -3584,7 +3584,7 @@ check_CVE_2017_5753_linux()
+ # so let's push the threshold to 70.
+ # v0.33+: now only count lfence opcodes after a jump, way less error-prone
+ # non patched kernel have between 0 and 20 matches, patched ones have at least 40-45
+- nb_lfence=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" 2>/dev/null | grep -w -B1 lfence | grep -Ewc 'jmp|jne|je')
++ nb_lfence=$("@objdump@" $objdump_options "$kernel" 2>/dev/null | @grep@ -w -B1 lfence | @grep@ -Ewc 'jmp|jne|je')
+ if [ "$nb_lfence" -lt 30 ]; then
+ pstatus yellow NO "only $nb_lfence jump-then-lfence instructions found, should be >= 30 (heuristic)"
+ else
+@@ -3655,7 +3655,7 @@ check_CVE_2017_5715()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5715_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5715_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3697,13 +3697,13 @@ check_CVE_2017_5715_linux()
+ # /proc/sys/kernel/ibrs_enabled: OpenSUSE tumbleweed
+ specex_knob_dir=$dir
+ ibrs_supported="$dir/ibrs_enabled exists"
+- ibrs_enabled=$(cat "$dir/ibrs_enabled" 2>/dev/null)
++ ibrs_enabled=$(@cat@ "$dir/ibrs_enabled" 2>/dev/null)
+ _debug "ibrs: found $dir/ibrs_enabled=$ibrs_enabled"
+ # if ibrs_enabled is there, ibpb_enabled will be in the same dir
+ if [ -e "$dir/ibpb_enabled" ]; then
+ # if the file is there, we have IBPB compiled-in (see note above for IBRS)
+ ibpb_supported="$dir/ibpb_enabled exists"
+- ibpb_enabled=$(cat "$dir/ibpb_enabled" 2>/dev/null)
++ ibpb_enabled=$(@cat@ "$dir/ibpb_enabled" 2>/dev/null)
+ _debug "ibpb: found $dir/ibpb_enabled=$ibpb_enabled"
+ else
+ _debug "ibpb: $dir/ibpb_enabled file doesn't exist"
+@@ -3718,7 +3718,7 @@ check_CVE_2017_5715_linux()
+ # which in that case means ibrs is supported *and* enabled for kernel & user
+ # as per the ibrs patch series v3
+ if [ -z "$ibrs_supported" ]; then
+- if grep ^flags "$procfs/cpuinfo" | grep -qw spec_ctrl_ibrs; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw spec_ctrl_ibrs; then
+ _debug "ibrs: found spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ ibrs_supported="spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ # enabled=2 -> kernel & user
+@@ -3728,13 +3728,13 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -n "$fullmsg" ]; then
+ # when IBPB is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q 'IBPB'; then
++ if echo "$fullmsg" | @grep@ -q 'IBPB'; then
+ _debug "ibpb: found enabled in sysfs"
+ [ -z "$ibpb_supported" ] && ibpb_supported='IBPB found enabled in sysfs'
+ [ -z "$ibpb_enabled" ] && ibpb_enabled=1
+ fi
+ # when IBRS_FW is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q ', IBRS_FW'; then
++ if echo "$fullmsg" | @grep@ -q ', IBRS_FW'; then
+ _debug "ibrs: found IBRS_FW in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS_FW in sysfs'
+ ibrs_fw_enabled=1
+@@ -3742,13 +3742,13 @@ check_CVE_2017_5715_linux()
+ # when IBRS is enabled on 4.15+, we can see it in sysfs
+ # on a more recent kernel, classic "IBRS" is not even longer an option, because of the performance impact.
+ # only "Enhanced IBRS" is available (on CPUs with the IBRS_ALL flag)
+- if echo "$fullmsg" | grep -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
++ if echo "$fullmsg" | @grep@ -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
+ _debug "ibrs: found IBRS in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS in sysfs'
+ [ -z "$ibrs_enabled" ] && ibrs_enabled=3
+ fi
+ # checking for 'Enhanced IBRS' in sysfs, enabled on CPUs with IBRS_ALL
+- if echo "$fullmsg" | grep -q -e 'Enhanced IBRS'; then
++ if echo "$fullmsg" | @grep@ -q -e 'Enhanced IBRS'; then
+ [ -z "$ibrs_supported" ] && ibrs_supported='found Enhanced IBRS in sysfs'
+ # 4 isn't actually a valid value of the now extinct "ibrs_enabled" flag file,
+ # that only went from 0 to 3, so we use 4 as "enhanced ibrs is enabled"
+@@ -3767,11 +3767,11 @@ check_CVE_2017_5715_linux()
+ fi
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibrs_can_tell=1
+- ibrs_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e ', IBRS_FW' | head -1)
++ ibrs_supported=$("@strings@" "$kernel" | @grep@ -Fw -e ', IBRS_FW' | @head@ -1)
+ if [ -n "$ibrs_supported" ]; then
+ _debug "ibrs: found ibrs evidence in kernel image ($ibrs_supported)"
+ ibrs_supported="found '$ibrs_supported' in kernel image"
+@@ -3780,7 +3780,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$opt_map" ]; then
+ ibrs_can_tell=1
+- if grep -q spec_ctrl "$opt_map"; then
++ if @grep@ -q spec_ctrl "$opt_map"; then
+ ibrs_supported="found spec_ctrl in symbols file"
+ _debug "ibrs: found '*spec_ctrl*' symbol in $opt_map"
+ fi
+@@ -3788,11 +3788,11 @@ check_CVE_2017_5715_linux()
+ # recent (4.15) vanilla kernels have IBPB but not IBRS, and without the debugfs tunables of Red Hat
+ # we can detect it directly in the image
+ if [ -z "$ibpb_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibpb_can_tell=1
+- ibpb_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e 'ibpb' -e ', IBPB' | head -1)
++ ibpb_supported=$("@strings@" "$kernel" | @grep@ -Fw -e 'ibpb' -e ', IBPB' | @head@ -1)
+ if [ -n "$ibpb_supported" ]; then
+ _debug "ibpb: found ibpb evidence in kernel image ($ibpb_supported)"
+ ibpb_supported="found '$ibpb_supported' in kernel image"
+@@ -3841,9 +3841,9 @@ check_CVE_2017_5715_linux()
+ 2) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel, user space, and firmware code" ; else pstatus green YES "for both kernel and user space"; fi;;
+ 3) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel and firmware code"; else pstatus green YES; fi;;
+ 4) pstatus green YES "Enhanced flavor, performance impact will be greatly reduced";;
+- *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
+- then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
+- else
++ *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
++ then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
++ else
+ pstatus yellow UNKNOWN; fi;;
+ esac
+ fi
+@@ -3894,7 +3894,7 @@ check_CVE_2017_5715_linux()
+ bp_harden=''
+ if [ -r "$opt_config" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
++ bp_harden=$(@grep@ -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_config"
+@@ -3902,7 +3902,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$bp_harden" ] && [ -n "$opt_map" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w bp_hardening_data "$opt_map")
++ bp_harden=$(@grep@ -w bp_hardening_data "$opt_map")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_map"
+@@ -3920,11 +3920,11 @@ check_CVE_2017_5715_linux()
+ # We check the RETPOLINE kernel options
+ retpoline=0
+ if [ -r "$opt_config" ]; then
+- if grep -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
++ if @grep@ -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
+ pstatus green YES
+ retpoline=1
+ # shellcheck disable=SC2046
+- _debug 'retpoline: found '$(grep '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
++ _debug 'retpoline: found '$(@grep@ '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
+ else
+ pstatus yellow NO
+ fi
+@@ -3945,8 +3945,8 @@ check_CVE_2017_5715_linux()
+ # since 5.15.28, this is now "Retpolines" as the implementation was switched to a generic one,
+ # so we look for both "retpoline" and "retpolines"
+ if [ "$opt_live" = 1 ] && [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qwi -e retpoline -e retpolines; then
+- if echo "$fullmsg" | grep -qwi minimal; then
++ if echo "$fullmsg" | @grep@ -qwi -e retpoline -e retpolines; then
++ if echo "$fullmsg" | @grep@ -qwi minimal; then
+ retpoline_compiler=0
+ retpoline_compiler_reason="kernel reports minimal retpoline compilation"
+ else
+@@ -3956,19 +3956,19 @@ check_CVE_2017_5715_linux()
+ fi
+ elif [ -n "$opt_map" ]; then
+ # look for the symbol
+- if grep -qw noretpoline_setup "$opt_map"; then
++ if @grep@ -qw noretpoline_setup "$opt_map"; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup symbol found in System.map"
+ fi
+ elif [ -n "$kernel" ]; then
+ # look for the symbol
+- if command -v "${opt_arch_prefix}nm" >/dev/null 2>&1; then
++ if command -v "@nm@" >/dev/null 2>&1; then
+ # the proper way: use nm and look for the symbol
+- if "${opt_arch_prefix}nm" "$kernel" 2>/dev/null | grep -qw 'noretpoline_setup'; then
++ if "@nm@" "$kernel" 2>/dev/null | @grep@ -qw 'noretpoline_setup'; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup found in kernel symbols"
+ fi
+- elif grep -q noretpoline_setup "$kernel"; then
++ elif @grep@ -q noretpoline_setup "$kernel"; then
+ # if we don't have nm, nevermind, the symbol name is long enough to not have
+ # any false positive using good old grep directly on the binary
+ retpoline_compiler=1
+@@ -3997,7 +3997,7 @@ check_CVE_2017_5715_linux()
+ retp_enabled=-1
+ if [ "$opt_live" = 1 ]; then
+ if [ -e "$specex_knob_dir/retp_enabled" ]; then
+- retp_enabled=$(cat "$specex_knob_dir/retp_enabled" 2>/dev/null)
++ retp_enabled=$(@cat@ "$specex_knob_dir/retp_enabled" 2>/dev/null)
+ _debug "retpoline: found $specex_knob_dir/retp_enabled=$retp_enabled"
+ _info_nol " * Retpoline is enabled: "
+ if [ "$retp_enabled" = 1 ]; then
+@@ -4027,7 +4027,7 @@ check_CVE_2017_5715_linux()
+ rsb_filling=0
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" != 1 ]; then
+ # if we're live and we aren't denied looking into /sys, let's do it
+- if echo "$msg" | grep -qw RSB; then
++ if echo "$msg" | @grep@ -qw RSB; then
+ rsb_filling=1
+ pstatus green YES
+ fi
+@@ -4036,7 +4036,7 @@ check_CVE_2017_5715_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if grep -qw -e 'Filling RSB on context switch' "$kernel"; then
++ if @grep@ -qw -e 'Filling RSB on context switch' "$kernel"; then
+ rsb_filling=1
+ pstatus green YES
+ else
+@@ -4198,7 +4198,7 @@ check_CVE_2017_5715_bsd()
+ {
+ _info "* Mitigation 1"
+ _info_nol " * Kernel supports IBRS: "
+- ibrs_disabled=$(sysctl -n hw.ibrs_disable 2>/dev/null)
++ ibrs_disabled=$(@sysctl@ -n hw.ibrs_disable 2>/dev/null)
+ if [ -z "$ibrs_disabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4206,7 +4206,7 @@ check_CVE_2017_5715_bsd()
+ fi
+
+ _info_nol " * IBRS enabled and active: "
+- ibrs_active=$(sysctl -n hw.ibrs_active 2>/dev/null)
++ ibrs_active=$(@sysctl@ -n hw.ibrs_active 2>/dev/null)
+ if [ "$ibrs_active" = 1 ]; then
+ pstatus green YES
+ else
+@@ -4219,10 +4219,10 @@ check_CVE_2017_5715_bsd()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the binutils package"
+ else
+- nb_thunks=$("${opt_arch_prefix}readelf" -s "$kernel" | grep -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
++ nb_thunks=$("@readelf@" -s "$kernel" | @grep@ -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
+ if [ "$nb_thunks" -gt 0 ]; then
+ retpoline=1
+ pstatus green YES "found $nb_thunks thunk(s)"
+@@ -4263,7 +4263,7 @@ check_CVE_2017_5715_bsd()
+ pti_performance_check()
+ {
+ _info_nol " * Reduced performance impact of PTI: "
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw pcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pcid; then
+ cpu_pcid=1
+ else
+ read_cpuid 0x1 0x0 $ECX 17 1 1; ret=$?
+@@ -4272,7 +4272,7 @@ pti_performance_check()
+ fi
+ fi
+
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw invpcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw invpcid; then
+ cpu_invpcid=1
+ else
+ read_cpuid 0x7 0x0 $EBX 10 1 1; ret=$?
+@@ -4297,7 +4297,7 @@ check_CVE_2017_5754()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5754_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5754_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4319,7 +4319,7 @@ check_CVE_2017_5754_linux()
+ kpti_can_tell=0
+ if [ -n "$opt_config" ]; then
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
++ kpti_support=$(@grep@ -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found option '$kpti_support' in $opt_config"
+ fi
+@@ -4329,7 +4329,7 @@ check_CVE_2017_5754_linux()
+ # so we try to find an exported symbol that is part of the PTI patch in System.map
+ # parse_kpti: arm
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e kpti_force_enabled -e parse_kpti "$opt_map")
++ kpti_support=$(@grep@ -w -e kpti_force_enabled -e parse_kpti "$opt_map")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $opt_map"
+ fi
+@@ -4339,10 +4339,10 @@ check_CVE_2017_5754_linux()
+ # nopti option that is part of the patch (kernel command line option)
+ # 'kpti=': arm
+ kpti_can_tell=1
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ else
+- kpti_support=$("${opt_arch_prefix}strings" "$kernel" | grep -w -e nopti -e kpti=)
++ kpti_support=$("@strings@" "$kernel" | @grep@ -w -e nopti -e kpti=)
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $kernel"
+ fi
+@@ -4369,20 +4369,20 @@ check_CVE_2017_5754_linux()
+ dmesg_grep="$dmesg_grep|x86/pti: Unmapping kernel while in userspace"
+ # aarch64
+ dmesg_grep="$dmesg_grep|CPU features: detected( feature)?: Kernel page table isolation \(KPTI\)"
+- if grep ^flags "$procfs/cpuinfo" | grep -qw pti; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pti; then
+ # vanilla PTI patch sets the 'pti' flag in cpuinfo
+ _debug "kpti_enabled: found 'pti' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+- elif grep ^flags "$procfs/cpuinfo" | grep -qw kaiser; then
++ elif @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw kaiser; then
+ # kernel line 4.9 sets the 'kaiser' flag in cpuinfo
+ _debug "kpti_enabled: found 'kaiser' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+ elif [ -e /sys/kernel/debug/x86/pti_enabled ]; then
+ # Red Hat Backport creates a dedicated file, see https://access.redhat.com/articles/3311301
+- kpti_enabled=$(cat /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
++ kpti_enabled=$(@cat@ /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
+ _debug "kpti_enabled: file /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
+ elif is_xen_dom0; then
+- pti_xen_pv_domU=$(xl dmesg | grep 'XPTI' | grep 'DomU enabled' | head -1)
++ pti_xen_pv_domU=$(xl @dmesg@ | @grep@ 'XPTI' | @grep@ 'DomU enabled' | @head@ -1)
+
+ [ -n "$pti_xen_pv_domU" ] && kpti_enabled=1
+ fi
+@@ -4457,7 +4457,7 @@ check_CVE_2017_5754_linux()
+ if [ -n "$kpti_support" ]; then
+ if [ -e "/sys/kernel/debug/x86/pti_enabled" ]; then
+ explain "Your kernel supports PTI but it's disabled, you can enable it with \`echo 1 > /sys/kernel/debug/x86/pti_enabled\`"
+- elif echo "$kernel_cmdline" | grep -q -w -e nopti -e pti=off; then
++ elif echo "$kernel_cmdline" | @grep@ -q -w -e nopti -e pti=off; then
+ explain "Your kernel supports PTI but it has been disabled on command-line, remove the nopti or pti=off option from your bootloader configuration"
+ else
+ explain "Your kernel supports PTI but it has been disabled, check \`dmesg\` right after boot to find clues why the system disabled it"
+@@ -4508,7 +4508,7 @@ check_CVE_2017_5754_linux()
+ check_CVE_2017_5754_bsd()
+ {
+ _info_nol "* Kernel supports Page Table Isolation (PTI): "
+- kpti_enabled=$(sysctl -n vm.pmap.pti 2>/dev/null)
++ kpti_enabled=$(@sysctl@ -n vm.pmap.pti 2>/dev/null)
+ if [ -z "$kpti_enabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4579,7 +4579,7 @@ check_CVE_2018_3639()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3639_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3639_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4598,33 +4598,33 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports disabling speculative store bypass (SSB): "
+ if [ "$opt_live" = 1 ]; then
+- if grep -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssb="found in $procfs/self/status"
+ _debug "found Speculation.Store.Bypass: in $procfs/self/status"
+ fi
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! grep -q 'arm64_sys_' "$kernel"; then
+- kernel_ssb=$("${opt_arch_prefix}strings" "$kernel" | grep spec_store_bypass | head -n1);
++ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! @grep@ -q 'arm64_sys_' "$kernel"; then
++ kernel_ssb=$("@strings@" "$kernel" | @grep@ spec_store_bypass | @head@ -n1);
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in kernel"
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! grep -q 'arm64_sys_' "$opt_map"; then
+- kernel_ssb=$(grep spec_store_bypass "$opt_map" | awk '{print $3}' | head -n1)
++ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! @grep@ -q 'arm64_sys_' "$opt_map"; then
++ kernel_ssb=$(@grep@ spec_store_bypass "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ # arm64 only:
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ]; then
+- kernel_ssb=$(grep -w cpu_enable_ssbs "$opt_map" | awk '{print $3}' | head -n1)
++ kernel_ssb=$(@grep@ -w cpu_enable_ssbs "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_config" ]; then
+- kernel_ssb=$(grep -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
++ kernel_ssb=$(@grep@ -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
+ [ -n "$kernel_ssb" ] && kernel_ssb="CONFIG_ARM64_SSBD enabled in kconfig"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ]; then
+ # this string only appears in kernel if CONFIG_ARM64_SSBD is set
+- kernel_ssb=$(grep -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
++ kernel_ssb=$(@grep@ -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
+ [ -n "$kernel_ssb" ] && kernel_ssb="found 'Speculative Store Bypassing Safe (SSBS)' in kernel"
+ fi
+ # /arm64 only
+@@ -4639,31 +4639,31 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_live" = 1 ]; then
+ # https://elixir.bootlin.com/linux/v5.0/source/fs/proc/array.c#L340
+ _info_nol "* SSB mitigation is enabled and active: "
+- if grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=1
+ pstatus green YES "per-thread through prctl"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=2
+ pstatus green YES "global"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus yellow NO
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=-2
+ pstatus blue NO "not vulnerable"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus blue NO
+ else
+- pstatus blue UNKNOWN "unknown value: $(grep -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | cut -d: -f2-)"
++ pstatus blue UNKNOWN "unknown value: $(@grep@ -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | @cut@ -d: -f2-)"
+ fi
+
+ if [ "$kernel_ssbd_enabled" = 1 ]; then
+ _info_nol "* SSB mitigation currently active for selected processes: "
+ # silence grep's stderr here to avoid ENOENT errors from processes that have exited since the shell's expansion of the *
+- mitigated_processes=$(find /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
+- | xargs -r0 grep -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
+- | sed s/status/exe/ | xargs -r -n1 readlink -f 2>/dev/null | xargs -r -n1 basename | sort -u | tr "\n" " " | sed 's/ $//')
++ mitigated_processes=$(@find@ /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
++ | @xargs@ -r0 @grep@ -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
++ | @sed@ s/status/exe/ | @xargs@ -r -n1 readlink -f 2>/dev/null | @xargs@ -r -n1 @basename@ | @sort@ -u | @tr@ "\n" " " | @sed@ 's/ $//')
+ if [ -n "$mitigated_processes" ]; then
+ pstatus green YES "$mitigated_processes"
+ else
+@@ -4715,7 +4715,7 @@ check_CVE_2018_3639_linux()
+ check_CVE_2018_3639_bsd()
+ {
+ _info_nol "* Kernel supports speculation store bypass: "
+- if sysctl hw.spec_store_bypass_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.spec_store_bypass_disable >/dev/null 2>&1; then
+ kernel_ssb=1
+ pstatus green YES
+ else
+@@ -4724,7 +4724,7 @@ check_CVE_2018_3639_bsd()
+ fi
+
+ _info_nol "* Speculation store bypass is administratively enabled: "
+- ssb_enabled=$(sysctl -n hw.spec_store_bypass_disable 2>/dev/null)
++ ssb_enabled=$(@sysctl@ -n hw.spec_store_bypass_disable 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable=$ssb_enabled"
+ case "$ssb_enabled" in
+ 0) pstatus yellow NO "disabled";;
+@@ -4734,7 +4734,7 @@ check_CVE_2018_3639_bsd()
+ esac
+
+ _info_nol "* Speculation store bypass is currently active: "
+- ssb_active=$(sysctl -n hw.spec_store_bypass_disable_active 2>/dev/null)
++ ssb_active=$(@sysctl@ -n hw.spec_store_bypass_disable_active 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable_active=$ssb_active"
+ case "$ssb_active" in
+ 1) pstatus green YES;;
+@@ -4806,7 +4806,7 @@ check_CVE_2018_3620()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3620_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3620_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4824,14 +4824,14 @@ check_CVE_2018_3620_linux()
+ fi
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports PTE inversion: "
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'strings' tool, please install it"
+ pteinv_supported=-1
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "$kernel_err"
+ pteinv_supported=-1
+ else
+- if "${opt_arch_prefix}strings" "$kernel" | grep -Fq 'PTE Inversion'; then
++ if "@strings@" "$kernel" | @grep@ -Fq 'PTE Inversion'; then
+ pstatus green YES "found in kernel image"
+ _debug "pteinv: found pte inversion evidence in kernel image"
+ pteinv_supported=1
+@@ -4844,7 +4844,7 @@ check_CVE_2018_3620_linux()
+ _info_nol "* PTE inversion enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -q 'Mitigation: PTE Inversion'; then
++ if echo "$fullmsg" | @grep@ -q 'Mitigation: PTE Inversion'; then
+ pstatus green YES
+ pteinv_active=1
+ else
+@@ -4892,7 +4892,7 @@ check_CVE_2018_3620_bsd()
+ else
+ _debug "vmm module already loaded"
+ fi
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ # https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
+ # this is very difficult to detect that the kernel reserved the 0 page, but this fix
+ # is part of the exact same patch than the other L1TF CVE, so we detect it
+@@ -4922,7 +4922,7 @@ check_CVE_2018_3646()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3646_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3646_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4948,7 +4948,7 @@ check_CVE_2018_3646_linux()
+ if [ "$opt_live" = 1 ]; then
+ if ! [ -r /sys/module/kvm_intel/parameters/ept ]; then
+ pstatus blue N/A "the kvm_intel module is not loaded"
+- elif [ "$(cat /sys/module/kvm_intel/parameters/ept)" = N ]; then
++ elif [ "$(@cat@ /sys/module/kvm_intel/parameters/ept)" = N ]; then
+ pstatus green YES
+ ept_disabled=1
+ else
+@@ -4960,15 +4960,15 @@ check_CVE_2018_3646_linux()
+
+ _info "* Mitigation 2"
+ _info_nol " * L1D flush is supported by kernel: "
+- if [ "$opt_live" = 1 ] && grep -qw flush_l1d "$procfs/cpuinfo"; then
++ if [ "$opt_live" = 1 ] && @grep@ -qw flush_l1d "$procfs/cpuinfo"; then
+ l1d_kernel="found flush_l1d in $procfs/cpuinfo"
+ fi
+ if [ -z "$l1d_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ l1d_kernel_err="missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ elif [ -n "$kernel_err" ]; then
+ l1d_kernel_err="$kernel_err"
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -qw flush_l1d; then
++ elif "@strings@" "$kernel" | @grep@ -qw flush_l1d; then
+ l1d_kernel='found flush_l1d in kernel image'
+ fi
+ fi
+@@ -4989,20 +4989,20 @@ check_CVE_2018_3646_linux()
+ # $l1dstatus is one of (auto|vulnerable|conditional cache flushes|cache flushes|EPT disabled|flush not necessary)
+ # $smtstatus is one of (vulnerable|disabled)
+ # can also just be "Not affected"
+- if echo "$fullmsg" | grep -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
++ if echo "$fullmsg" | @grep@ -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
+ l1d_mode=0
+ pstatus yellow NO
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) conditional cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) conditional cache flushes'; then
+ l1d_mode=1
+ pstatus green YES "conditional flushes"
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) cache flushes'; then
+ l1d_mode=2
+ pstatus green YES "unconditional flushes"
+ else
+ if is_xen_dom0; then
+- l1d_xen_hardware=$(xl dmesg | grep 'Hardware features:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_hypervisor=$(xl dmesg | grep 'Xen settings:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_pv_domU=$(xl dmesg | grep 'PV L1TF shadowing:' | grep 'DomU enabled' | head -1)
++ l1d_xen_hardware=$(xl @dmesg@ | @grep@ 'Hardware features:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_hypervisor=$(xl @dmesg@ | @grep@ 'Xen settings:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_pv_domU=$(xl @dmesg@ | @grep@ 'PV L1TF shadowing:' | @grep@ 'DomU enabled' | @head@ -1)
+
+ if [ -n "$l1d_xen_hardware" ] && [ -n "$l1d_xen_hypervisor" ] && [ -n "$l1d_xen_pv_domU" ]; then
+ l1d_mode=5
+@@ -5033,7 +5033,7 @@ check_CVE_2018_3646_linux()
+
+ _info_nol " * Hardware-backed L1D flush supported: "
+ if [ "$opt_live" = 1 ]; then
+- if grep -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
++ if @grep@ -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
+ pstatus green YES "performance impact of the mitigation will be greatly reduced"
+ else
+ pstatus blue NO "flush will be done in software, this is slower"
+@@ -5105,7 +5105,7 @@ check_CVE_2018_3646_linux()
+ check_CVE_2018_3646_bsd()
+ {
+ _info_nol "* Kernel supports L1D flushing: "
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_l1d_supported=1
+ else
+@@ -5114,7 +5114,7 @@ check_CVE_2018_3646_bsd()
+ fi
+
+ _info_nol "* L1D flushing is enabled: "
+- kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush 2>/dev/null)
++ kernel_l1d_enabled=$(@sysctl@ -n hw.vmm.vmx.l1d_flush 2>/dev/null)
+ case "$kernel_l1d_enabled" in
+ 0) pstatus yellow NO;;
+ 1) pstatus green YES;;
+@@ -5168,7 +5168,7 @@ check_CVE_2018_12127()
+ ###################
+ # MDSUM SECTION
+
+-# Microarchitectural Data Sampling Uncacheable Memory
++# Microarchitectural Data Sampling Uncacheable Memory
+ check_CVE_2019_11091()
+ {
+ cve='CVE-2019-11091'
+@@ -5182,7 +5182,7 @@ check_mds()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_mds_linux "$cve"
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_mds_bsd "$cve"
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5193,7 +5193,7 @@ check_mds_bsd()
+ {
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ if [ "$opt_live" = 1 ]; then
+- if sysctl hw.mds_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.mds_disable >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5201,7 +5201,7 @@ check_mds_bsd()
+ kernel_md_clear=0
+ fi
+ else
+- if grep -Fq hw.mds_disable $opt_kernel; then
++ if @grep@ -Fq hw.mds_disable $opt_kernel; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5211,8 +5211,8 @@ check_mds_bsd()
+ fi
+
+ _info_nol "* CPU Hyper-Threading (SMT) is disabled: "
+- if sysctl machdep.hyperthreading_allowed >/dev/null 2>&1; then
+- kernel_smt_allowed=$(sysctl -n machdep.hyperthreading_allowed 2>/dev/null)
++ if @sysctl@ machdep.hyperthreading_allowed >/dev/null 2>&1; then
++ kernel_smt_allowed=$(@sysctl@ -n machdep.hyperthreading_allowed 2>/dev/null)
+ if [ "$kernel_smt_allowed" = 1 ]; then
+ pstatus yellow NO
+ else
+@@ -5224,7 +5224,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is enabled: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_enabled=$(sysctl -n hw.mds_disable 2>/dev/null)
++ kernel_mds_enabled=$(@sysctl@ -n hw.mds_disable 2>/dev/null)
+ else
+ kernel_mds_enabled=0
+ fi
+@@ -5238,7 +5238,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is active: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_state=$(sysctl -n hw.mds_disable_state 2>/dev/null)
++ kernel_mds_state=$(@sysctl@ -n hw.mds_disable_state 2>/dev/null)
+ else
+ kernel_mds_state=inactive
+ fi
+@@ -5296,16 +5296,16 @@ check_mds_linux()
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ kernel_md_clear=''
+ kernel_md_clear_can_tell=1
+- if [ "$opt_live" = 1 ] && grep ^flags "$procfs/cpuinfo" | grep -qw md_clear; then
++ if [ "$opt_live" = 1 ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw md_clear; then
+ kernel_md_clear="md_clear found in $procfs/cpuinfo"
+ pstatus green YES "$kernel_md_clear"
+ fi
+ if [ -z "$kernel_md_clear" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ kernel_md_clear_can_tell=0
+ elif [ -n "$kernel_err" ]; then
+ kernel_md_clear_can_tell=0
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'Clear CPU buffers'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'Clear CPU buffers'; then
+ _debug "md_clear: found 'Clear CPU buffers' string in kernel image"
+ kernel_md_clear='found md_clear implementation evidence in kernel image'
+ pstatus green YES "$kernel_md_clear"
+@@ -5321,7 +5321,7 @@ check_mds_linux()
+
+ if [ "$opt_live" = 1 ] && [ "$sys_interface_available" = 1 ]; then
+ _info_nol "* Kernel mitigation is enabled and active: "
+- if echo "$fullmsg" | grep -qi ^mitigation; then
++ if echo "$fullmsg" | @grep@ -qi ^mitigation; then
+ mds_mitigated=1
+ pstatus green YES
+ else
+@@ -5329,7 +5329,7 @@ check_mds_linux()
+ pstatus yellow NO
+ fi
+ _info_nol "* SMT is either mitigated or disabled: "
+- if echo "$fullmsg" | grep -Eq 'SMT (disabled|mitigated)'; then
++ if echo "$fullmsg" | @grep@ -Eq 'SMT (disabled|mitigated)'; then
+ mds_smt_mitigated=1
+ pstatus green YES
+ else
+@@ -5415,7 +5415,7 @@ check_CVE_2019_11135()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2019_11135_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2019_11135_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5436,7 +5436,7 @@ check_CVE_2019_11135_linux()
+ kernel_taa=''
+ if [ -n "$kernel_err" ]; then
+ kernel_taa_err="$kernel_err"
+- elif grep -q 'tsx_async_abort' "$kernel"; then
++ elif @grep@ -q 'tsx_async_abort' "$kernel"; then
+ kernel_taa="found tsx_async_abort in kernel image"
+ fi
+ if [ -n "$kernel_taa" ]; then
+@@ -5450,7 +5450,7 @@ check_CVE_2019_11135_linux()
+ _info_nol "* TAA mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5485,9 +5485,9 @@ check_CVE_2019_11135_linux()
+ else
+ if [ "$opt_paranoid" = 1 ]; then
+ # in paranoid mode, TSX or SMT enabled are not OK, even if TAA is mitigated
+- if ! echo "$fullmsg" | grep -qF 'TSX disabled'; then
++ if ! echo "$fullmsg" | @grep@ -qF 'TSX disabled'; then
+ pvulnstatus $cve VULN "TSX must be disabled for full mitigation"
+- elif echo "$fullmsg" | grep -qF 'SMT vulnerable'; then
++ elif echo "$fullmsg" | @grep@ -qF 'SMT vulnerable'; then
+ pvulnstatus $cve VULN "SMT (HyperThreading) must be disabled for full mitigation"
+ else
+ pvulnstatus $cve "$status" "$msg"
+@@ -5517,7 +5517,7 @@ check_CVE_2018_12207()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_12207_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_12207_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5541,7 +5541,7 @@ check_CVE_2018_12207_linux()
+ if [ -n "$kernel_err" ]; then
+ kernel_itlbmh_err="$kernel_err"
+ # commit 5219505fcbb640e273a0d51c19c38de0100ec5a9
+- elif grep -q 'itlb_multihit' "$kernel"; then
++ elif @grep@ -q 'itlb_multihit' "$kernel"; then
+ kernel_itlbmh="found itlb_multihit in kernel image"
+ fi
+ if [ -n "$kernel_itlbmh" ]; then
+@@ -5555,7 +5555,7 @@ check_CVE_2018_12207_linux()
+ _info_nol "* iTLB Multihit mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qF 'Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qF 'Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5597,7 +5597,7 @@ check_CVE_2018_12207_linux()
+ check_CVE_2018_12207_bsd()
+ {
+ _info_nol "* Kernel supports disabling superpages for executable mappings under EPT: "
+- kernel_2m_x_ept=$(sysctl -n vm.pmap.allow_2m_x_ept 2>/dev/null)
++ kernel_2m_x_ept=$(@sysctl@ -n vm.pmap.allow_2m_x_ept 2>/dev/null)
+ if [ -z "$kernel_2m_x_ept" ]; then
+ pstatus yellow NO
+ else
+@@ -5634,7 +5634,7 @@ check_CVE_2020_0543()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2020_0543_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2020_0543_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5655,7 +5655,7 @@ check_CVE_2020_0543_linux()
+ kernel_srbds=''
+ if [ -n "$kernel_err" ]; then
+ kernel_srbds_err="$kernel_err"
+- elif grep -q 'Dependent on hypervisor' "$kernel"; then
++ elif @grep@ -q 'Dependent on hypervisor' "$kernel"; then
+ kernel_srbds="found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation"
+ fi
+ if [ -n "$kernel_srbds" ]; then
+@@ -5668,7 +5668,7 @@ check_CVE_2020_0543_linux()
+ _info_nol "* SRBDS mitigation control is enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5758,8 +5758,8 @@ fi
+ # now run the checks the user asked for
+ for cve in $supported_cve_list
+ do
+- if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | grep -qw "$cve"; then
+- check_"$(echo "$cve" | tr - _)"
++ if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | @grep@ -qw "$cve"; then
++ check_"$(echo "$cve" | @tr@ - _)"
+ _info
+ fi
+ done
+@@ -5773,17 +5773,17 @@ if [ "$bad_accuracy" = 1 ]; then
+ _warn "We're missing some kernel info (see -v), accuracy might be reduced"
+ fi
+
+-_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | grep -v -F 'mockme=' | sort | tr "\n" '|')
++_vars=$(set | @grep@ -Ev '^[A-Z_[:space:]]' | @grep@ -v -F 'mockme=' | @sort@ | @tr@ "\n" '|')
+ _debug "variables at end of script: $_vars"
+
+ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+- if command -v "gzip" >/dev/null 2>&1; then
++ if command -v "@gzip@" >/dev/null 2>&1; then
+ # not a useless use of cat: gzipping cpuinfo directly doesn't work well
+ # shellcheck disable=SC2002
+- if command -v "base64" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | base64 -w0)"
+- elif command -v "uuencode" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | uuencode -m - | grep -Fv 'begin-base64' | grep -Fxv -- '====' | tr -d "\n")"
++ if command -v "@base64@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @base64@ -w0)"
++ elif command -v "@uuencode@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @uuencode@ -m - | @grep@ -Fv 'begin-base64' | @grep@ -Fxv -- '====' | @tr@ -d "\n")"
+ fi
+ fi
+ if [ -n "$mock_cpuinfo" ]; then
+@@ -5792,7 +5792,7 @@ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+ fi
+ _info ""
+ # shellcheck disable=SC2046
+- _warn "To mock this CPU, set those vars: "$(echo "$mockme" | sort -u)
++ _warn "To mock this CPU, set those vars: "$(echo "$mockme" | @sort@ -u)
+ fi
+
+ if [ "$opt_explain" = 0 ]; then
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
new file mode 100644
index 0000000000..afec52b418
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
@@ -0,0 +1,26 @@
+From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 5 Nov 2022 23:22:31 +0800
+Subject: [PATCH] Add support for Guix System kernel.
+
+---
+ spectre-meltdown-checker.sh | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 248a444..855a090 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
+ [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
++ # Guix System:
++ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+ [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
+ # Clear Linux:
+
+base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
+--
+2.38.0
base-commit: 70df5c47a89f4f353a1df94467581a0f0da599a4
--
2.38.1
^ permalink raw reply related [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v2] gnu: Add spectre-meltdown-checker.
2022-11-11 11:10 ` [bug#59053] [PATCH v2] " Hilton Chain via Guix-patches via
@ 2022-11-11 15:13 ` Liliana Marie Prikler
2022-11-12 12:14 ` [bug#59053] [PATCH v3] " Hilton Chain via Guix-patches via
0 siblings, 1 reply; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-11 15:13 UTC (permalink / raw)
To: Hilton Chain; +Cc: 59053
Hi,
Am Freitag, dem 11.11.2022 um 19:10 +0800 schrieb Hilton Chain:
> * gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
> * gnu/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch:
> New file.
> * gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-
> substitution.patch:
> New file.
> * gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch:
> New file.
> * gnu/local.mk (dist_patch_DATA): Add patches.
> ---
> v1 -> v2:
>
> gnu/local.mk | 3 +
> gnu/packages/linux.scm | 53 +
> ...ker-remove-builtin-firmware-database.patch | 554 +++++
> ...cker-stage-commands-for-substitution.patch | 1947
> +++++++++++++++++
> ...n-checker-support-guix-system-kernel.patch | 26 +
> 5 files changed, 2583 insertions(+)
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> remove-builtin-firmware-database.patch
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> stage-commands-for-substitution.patch
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> support-guix-system-kernel.patch
>
> diff --git a/gnu/local.mk b/gnu/local.mk
> index 27b31ea27f..d518cd8641 100644
> --- a/gnu/local.mk
> +++ b/gnu/local.mk
> @@ -1851,6 +1851,9 @@ dist_patch_DATA
> = \
> %D%/packages/patches/syslinux-strip-gnu-property.patch \
> %D%/packages/patches/snappy-add-O2-flag-in-
> CmakeLists.txt.patch \
> %D%/packages/patches/snappy-add-inline-for-GCC.patch \
> + %D%/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch \
> + %D%/packages/patches/spectre-meltdown-checker-stage-commands-for-
> substitution.patch \
> + %D%/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch \
> %D%/packages/patches/sphinxbase-fix-doxygen.patch \
> %D%/packages/patches/spice-vdagent-glib-2.68.patch \
> %D%/packages/patches/sssd-optional-systemd.patch \
> diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
> index 2c06269504..5a0d55833a 100644
> --- a/gnu/packages/linux.scm
> +++ b/gnu/packages/linux.scm
> @@ -9595,3 +9595,56 @@ (define-public edac-utils
> error detection and correction (EDAC).")
> (home-page "https://github.com/grondo/edac-utils")
> (license license:gpl2+)))
> +
> +(define-public spectre-meltdown-checker
> + (package
> + (name "spectre-meltdown-checker")
> + (version "0.45")
> + (source (origin
> + (method git-fetch)
> + (uri (git-reference
> + (url
> "https://github.com/speed47/spectre-meltdown-checker")
> + (commit (string-append "v" version))))
> + (file-name (git-file-name name version))
> + (patches
> + (search-patches
> + ;;
> https://github.com/speed47/spectre-meltdown-checker/pull/441
> + "spectre-meltdown-checker-support-guix-system-
> kernel.patch"
> + ;; NOTE: Update these patches when updating.
> + "spectre-meltdown-checker-stage-commands-for-
> substitution.patch"
> + "spectre-meltdown-checker-remove-builtin-firmware-
> database.patch"))
> + (sha256
> + (base32
> +
> "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
> + (build-system copy-build-system)
> + (arguments
> + (list #:install-plan
> + #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-
> checker"))
> + #:phases
> + #~(modify-phases %standard-phases
> + (add-after 'unpack 'fixpath
> + (lambda* (#:key inputs #:allow-other-keys)
> + (substitute* "spectre-meltdown-checker.sh"
> + (("@sysctl@") (search-input-file inputs
> "/sbin/sysctl"))
> + (("@([a-z0-9]*)@" _ m _)
> + (search-input-file inputs (string-append
> "/bin/" m)))))))))
I'd prefer "command" instead of m as a variable name here.
> + (inputs
> + (list binutils
> + coreutils
> + grep
> + kmod
> + lz4
> + lzop
> + perl
> + procps
> + sharutils
> + util-linux
> + which
> + zstd))
> + (home-page
> "https://github.com/speed47/spectre-meltdown-checker")
> + (synopsis "CPU vulnerability / mitigation checker")
> + (description
> + "This package provides a shell script to assess your system's
> resilience
> +against the several transient execution CVEs that were published
> since early
> +2018, and give you guidance as to how to mitigate them.")
> + (license license:gpl3)))
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-
> builtin-firmware-database.patch b/gnu/packages/patches/spectre-
> meltdown-checker-remove-builtin-firmware-database.patch
> new file mode 100644
> index 0000000000..e926551550
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch
> @@ -0,0 +1,554 @@
> +From ac4bb2e61e4e8d195d560014816e107b315817ff Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Fri, 11 Nov 2022 18:55:25 +0800
> +Subject: [PATCH 2/2] Remove builtin firmware database.
> +
> +---
> + spectre-meltdown-checker.sh | 477 ++-------------------------------
> ---
> + 1 file changed, 27 insertions(+), 450 deletions(-)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 82cf1b6..79c4bb7 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -95,7 +95,6 @@ show_usage()
> + --cpu [#,all] interact with CPUID and MSR
> of CPU core number #, or all (default: CPU core 0)
> + --update-fwdb update our local copy of the
> CPU microcodes versions database (using the awesome
> + MCExtractor project and the
> Intel firmwares GitHub repository)
> +- --update-builtin-fwdb same as --update-fwdb but
> update builtin DB inside the script itself
> + --dump-mock-data used to mimick a CPU on an
> other system, mainly used to help debugging this script
> +
> + Return codes:
> +@@ -853,9 +852,9 @@ update_fwdb()
> + mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
> + mcedb_url='
> https://github.com/platomav/MCExtractor/raw/master/MCE.db'
> + _info_nol "Fetching MCE.db from the MCExtractor project... "
> +- if command -v wget >/dev/null 2>&1; then
> +- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
> +- elif command -v curl >/dev/null 2>&1; then
> ++ # if command -v wget >/dev/null 2>&1; then
> ++ # wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
> ++ if command -v curl >/dev/null 2>&1; then
> + curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
> + elif command -v fetch >/dev/null 2>&1; then
> + fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
The curl line and fetch line do the same thing as the wget line.
Prefer removal over commenting.
> +@@ -874,9 +873,9 @@ update_fwdb()
> + intel_url="
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-
> Files/archive/main.zip"
> + _info_nol "Fetching Intel firmwares... "
> + ##
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
> +- if command -v wget >/dev/null 2>&1; then
> +- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
> +- elif command -v curl >/dev/null 2>&1; then
> ++ # if command -v wget >/dev/null 2>&1; then
> ++ # wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
> ++ if command -v curl >/dev/null 2>&1; then
> + curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
> + elif command -v fetch >/dev/null 2>&1; then
> + fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
Same here.
> +@@ -969,13 +968,13 @@ update_fwdb()
> + } > "$mcedb_cache"
> + echo DONE "(version $dbversion)"
> +
> +- if [ "$1" = builtin ]; then
> +- newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
> +- @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" >
> "$newfile"
> +- @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >>
> "$newfile"
> +- @cat@ "$newfile" > "$0"
> +- @rm@ -f "$newfile"
> +- fi
> ++ # if [ "$1" = builtin ]; then
> ++ # newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
> ++ # @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" >
> "$newfile"
> ++ # @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >>
> "$newfile"
> ++ # @cat@ "$newfile" > "$0"
> ++ # @rm@ -f "$newfile"
> ++ # fi
This time, it seems completely removed, but still prefer removal over
commenting.
> + }
> +
> + parse_opt_file()
> +@@ -1070,9 +1069,9 @@ while [ -n "${1:-}" ]; do
> + elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb"
> ]; then
> + update_fwdb
> + exit $?
> +- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--
> update-builtin-mcedb" ]; then
> +- update_fwdb builtin
> +- exit $?
> ++ # elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--
> update-builtin-mcedb" ]; then
> ++ # update_fwdb builtin
> ++ # exit $?
> + elif [ "$1" = "--dump-mock-data" ]; then
> + opt_mock=1
> + shift
> +@@ -2033,22 +2032,22 @@ is_xen_domU()
> + fi
> + }
> +
> +-builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
> ++# builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
> + if [ -r "$mcedb_cache" ]; then
> + # we have a local cache file, but it might be older than the
> builtin version we have
> + local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> + # sort -V sorts by version number
> +- older_dbversion=$(printf "%b\n%b" "$local_dbversion"
> "$builtin_dbversion" | @sort@ -V | @head@ -n1)
> +- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
> ++ # older_dbversion=$(printf "%b\n%b" "$local_dbversion"
> "$builtin_dbversion" | @sort@ -V | @head@ -n1)
> ++ # if [ "$older_dbversion" = "$builtin_dbversion" ]; then
> + mcedb_source="$mcedb_cache"
> + mcedb_info="local firmwares DB $local_dbversion"
> +- fi
> ++ # fi
> + fi
> + # if mcedb_source is not set, either we don't have a local cached
> db, or it is older than the builtin db
> +-if [ -z "${mcedb_source:-}" ]; then
> +- mcedb_source="$0"
> +- mcedb_info="builtin firmwares DB $builtin_dbversion"
> +-fi
> ++# if [ -z "${mcedb_source:-}" ]; then
> ++# mcedb_source="$0"
> ++# mcedb_info="builtin firmwares DB $builtin_dbversion"
> ++# fi
I'm not sure whether this is correctly patched.
> + read_mcedb()
> + {
> + @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / {
> DELIM=1 }' "$mcedb_source"
> +@@ -2070,6 +2069,9 @@ is_latest_known_ucode()
> + else
> + return 2
> + fi
> ++ if [ -z "$mcedb_source" ]; then
> ++ return 2
> ++ fi
Here neither, what does the return 2 above do?
> + for tuple in $(read_mcedb | @grep@ "$(printf
> "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
> + do
> + ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
> +@@ -5833,428 +5835,3 @@ fi
> + [ "$global_critical" = 1 ] && exit 2 # critical
> + [ "$global_unknown" = 1 ] && exit 3 # unknown
> + exit 0 # ok
> +-
> +-# We're using MCE.db from the excellent platomav's MCExtractor
> project
> +-# The builtin version follows, but the user can download an up-to-
> date copy (to be stored in his $HOME) by using --update-fwdb
> +-# To update the builtin version itself (by *modifying* this very
> file), use --update-builtin-fwdb
> +-
Can we remove this builtin version without a patch, i.e. a snippet?
I think that doing so would be more robust than keeping the patch up to
date.
> +-# %%% MCEDB v222+i20220208
> +-# I,0x00000611,0x00000B27,19961218
> +-# I,0x00000612,0x000000C6,19961210
> +-# I,0x00000616,0x000000C6,19961210
> +-# I,0x00000617,0x000000C6,19961210
> +-# I,0x00000619,0x000000D2,19980218
> +-# I,0x00000630,0x00000013,19960827
> +-# I,0x00000632,0x00000020,19960903
> +-# I,0x00000633,0x00000036,19980923
> +-# I,0x00000634,0x00000037,19980923
> +-# I,0x00000650,0x00000045,19990525
> +-# I,0x00000651,0x00000042,19990525
> +-# I,0x00000652,0x0000002D,19990518
> +-# I,0x00000653,0x00000010,19990628
> +-# I,0x00000660,0x0000000A,19990505
> +-# I,0x00000665,0x00000003,19990505
> +-# I,0x0000066A,0x0000000D,19990505
> +-# I,0x0000066D,0x00000007,19990505
> +-# I,0x00000670,0x00000007,19980602
> +-# I,0x00000671,0x00000014,19980811
> +-# I,0x00000672,0x00000038,19990922
> +-# I,0x00000673,0x0000002E,19990910
> +-# I,0x00000680,0x00000017,19990610
> +-# I,0x00000681,0x00000014,19991209
> +-# I,0x00000683,0x00000014,20010206
> +-# I,0x00000686,0x00000008,20000505
> +-# I,0x0000068A,0x00000005,20001207
> +-# I,0x00000690,0x00000004,20000206
> +-# I,0x00000691,0x00000001,20020527
> +-# I,0x00000692,0x00000001,20020620
> +-# I,0x00000694,0x00000002,20020926
> +-# I,0x00000695,0x00000047,20041109
> +-# I,0x00000696,0x00000001,20000707
> +-# I,0x000006A0,0x00000003,20000110
> +-# I,0x000006A1,0x00000001,20000306
> +-# I,0x000006A4,0x00000001,20000616
> +-# I,0x000006B0,0x0000001A,20010129
> +-# I,0x000006B1,0x0000001D,20010220
> +-# I,0x000006B4,0x00000002,20020111
> +-# I,0x000006D0,0x00000006,20030522
> +-# I,0x000006D1,0x00000009,20030709
> +-# I,0x000006D2,0x00000010,20030814
> +-# I,0x000006D6,0x00000018,20041017
> +-# I,0x000006D8,0x00000021,20060831
> +-# I,0x000006E0,0x00000008,20050215
> +-# I,0x000006E1,0x0000000C,20050413
> +-# I,0x000006E4,0x00000026,20050816
> +-# I,0x000006E8,0x0000003C,20060208
> +-# I,0x000006EC,0x0000005B,20070208
> +-# I,0x000006F0,0x00000005,20050818
> +-# I,0x000006F1,0x00000012,20051129
> +-# I,0x000006F2,0x0000005D,20101002
> +-# I,0x000006F4,0x00000028,20060417
> +-# I,0x000006F5,0x00000039,20060727
> +-# I,0x000006F6,0x000000D2,20101001
> +-# I,0x000006F7,0x0000006B,20101002
> +-# I,0x000006F9,0x00000084,20061012
> +-# I,0x000006FA,0x00000095,20101002
> +-# I,0x000006FB,0x000000C1,20111004
> +-# I,0x000006FD,0x000000A4,20101002
> +-# I,0x00000F00,0xFFFF0001,20000130
> +-# I,0x00000F01,0xFFFF0007,20000404
> +-# I,0x00000F02,0xFFFF000B,20000518
> +-# I,0x00000F03,0xFFFF0001,20000518
> +-# I,0x00000F04,0xFFFF0010,20000803
> +-# I,0x00000F05,0x0000000C,20000824
> +-# I,0x00000F06,0x00000004,20000911
> +-# I,0x00000F07,0x00000012,20020716
> +-# I,0x00000F08,0x00000008,20001101
> +-# I,0x00000F09,0x00000008,20010104
> +-# I,0x00000F0A,0x00000015,20020821
> +-# I,0x00000F11,0x0000000A,20030729
> +-# I,0x00000F12,0x0000002F,20030502
> +-# I,0x00000F13,0x00000005,20030508
> +-# I,0x00000F20,0x00000001,20010423
> +-# I,0x00000F21,0x00000003,20010529
> +-# I,0x00000F22,0x00000005,20030729
> +-# I,0x00000F23,0x0000000D,20010817
> +-# I,0x00000F24,0x00000021,20030610
> +-# I,0x00000F25,0x0000002C,20040826
> +-# I,0x00000F26,0x00000010,20040805
> +-# I,0x00000F27,0x00000039,20030604
> +-# I,0x00000F29,0x0000002F,20040811
> +-# I,0x00000F30,0x00000013,20030815
> +-# I,0x00000F31,0x0000000B,20031021
> +-# I,0x00000F32,0x0000000A,20040511
> +-# I,0x00000F33,0x0000000C,20050421
> +-# I,0x00000F34,0x00000017,20050421
> +-# I,0x00000F36,0x00000007,20040309
> +-# I,0x00000F37,0x00000003,20031218
> +-# I,0x00000F40,0x00000006,20040318
> +-# I,0x00000F41,0x00000017,20050422
> +-# I,0x00000F42,0x00000003,20050421
> +-# I,0x00000F43,0x00000005,20050421
> +-# I,0x00000F44,0x00000006,20050421
> +-# I,0x00000F46,0x00000004,20050411
> +-# I,0x00000F47,0x00000003,20050421
> +-# I,0x00000F48,0x0000000E,20080115
> +-# I,0x00000F49,0x00000003,20050421
> +-# I,0x00000F4A,0x00000004,20051214
> +-# I,0x00000F60,0x00000005,20050124
> +-# I,0x00000F61,0x00000008,20050610
> +-# I,0x00000F62,0x0000000F,20051215
> +-# I,0x00000F63,0x00000005,20051010
> +-# I,0x00000F64,0x00000004,20051223
> +-# I,0x00000F65,0x0000000B,20070510
> +-# I,0x00000F66,0x0000001B,20060310
> +-# I,0x00000F68,0x00000009,20060714
> +-# I,0x00001632,0x00000002,19980610
> +-# I,0x00010650,0x00000002,20060513
> +-# I,0x00010660,0x00000004,20060612
> +-# I,0x00010661,0x00000045,20101004
> +-# I,0x00010670,0x00000005,20070209
> +-# I,0x00010671,0x00000106,20070329
> +-# I,0x00010674,0x84050100,20070726
> +-# I,0x00010676,0x00000612,20150802
> +-# I,0x00010677,0x0000070D,20150802
> +-# I,0x0001067A,0x00000A0E,20150729
> +-# I,0x000106A0,0xFFFF001A,20071128
> +-# I,0x000106A1,0xFFFF000B,20080220
> +-# I,0x000106A2,0xFFFF0019,20080714
> +-# I,0x000106A4,0x00000013,20150630
> +-# I,0x000106A5,0x0000001D,20180511
> +-# I,0x000106C0,0x00000007,20070824
> +-# I,0x000106C1,0x00000109,20071203
> +-# I,0x000106C2,0x00000219,20090410
> +-# I,0x000106C9,0x00000007,20090213
> +-# I,0x000106CA,0x00000107,20090825
> +-# I,0x000106D0,0x00000005,20071204
> +-# I,0x000106D1,0x0000002A,20150803
> +-# I,0x000106E0,0xFFFF0022,20090116
> +-# I,0x000106E1,0xFFFF000D,20090206
> +-# I,0x000106E2,0xFFFF0011,20090924
> +-# I,0x000106E3,0xFFFF0011,20090512
> +-# I,0x000106E4,0x00000003,20130701
> +-# I,0x000106E5,0x0000000A,20180508
> +-# I,0x000106F0,0xFFFF0009,20090210
> +-# I,0x000106F1,0xFFFF0007,20090210
> +-# I,0x00020650,0xFFFF0008,20090218
> +-# I,0x00020651,0xFFFF0018,20090818
> +-# I,0x00020652,0x00000011,20180508
> +-# I,0x00020654,0xFFFF0007,20091124
> +-# I,0x00020655,0x00000007,20180423
> +-# I,0x00020661,0x00000105,20110718
> +-# I,0x000206A0,0x00000029,20091102
> +-# I,0x000206A1,0x00000007,20091223
> +-# I,0x000206A2,0x00000027,20100502
> +-# I,0x000206A3,0x00000009,20100609
> +-# I,0x000206A4,0x00000022,20100414
> +-# I,0x000206A5,0x00000007,20100722
> +-# I,0x000206A6,0x90030028,20100924
> +-# I,0x000206A7,0x0000002F,20190217
> +-# I,0x000206C0,0xFFFF001C,20091214
> +-# I,0x000206C1,0x00000006,20091222
> +-# I,0x000206C2,0x0000001F,20180508
> +-# I,0x000206D0,0x80000006,20100816
> +-# I,0x000206D1,0x80000106,20101201
> +-# I,0x000206D2,0xAF506958,20110714
> +-# I,0x000206D3,0xAF50696A,20110816
> +-# I,0x000206D5,0xAF5069E5,20120118
> +-# I,0x000206D6,0x00000621,20200304
> +-# I,0x000206D7,0x0000071A,20200324
> +-# I,0x000206E0,0xE3493401,20090108
> +-# I,0x000206E1,0xE3493402,20090224
> +-# I,0x000206E2,0xFFFF0004,20081001
> +-# I,0x000206E3,0xE4486547,20090701
> +-# I,0x000206E4,0xFFFF0008,20090619
> +-# I,0x000206E5,0xFFFF0018,20091215
> +-# I,0x000206E6,0x0000000D,20180515
> +-# I,0x000206F0,0x00000005,20100729
> +-# I,0x000206F1,0x00000008,20101013
> +-# I,0x000206F2,0x0000003B,20180516
> +-# I,0x00030650,0x00000009,20120118
> +-# I,0x00030651,0x00000110,20131014
> +-# I,0x00030660,0x00000003,20101103
> +-# I,0x00030661,0x0000010F,20150721
> +-# I,0x00030669,0x0000010D,20130515
> +-# I,0x00030671,0x00000117,20130410
> +-# I,0x00030672,0x0000022E,20140401
> +-# I,0x00030673,0x83290100,20190916
> +-# I,0x00030678,0x00000838,20190422
> +-# I,0x00030679,0x0000090D,20190710
> +-# I,0x000306A0,0x00000007,20110407
> +-# I,0x000306A2,0x0000000C,20110725
> +-# I,0x000306A4,0x00000007,20110908
> +-# I,0x000306A5,0x00000009,20111110
> +-# I,0x000306A6,0x00000004,20111114
> +-# I,0x000306A8,0x00000010,20120220
> +-# I,0x000306A9,0x00000021,20190213
> +-# I,0x000306C0,0xFFFF0013,20111110
> +-# I,0x000306C1,0xFFFF0014,20120725
> +-# I,0x000306C2,0xFFFF0006,20121017
> +-# I,0x000306C3,0x00000028,20191112
> +-# I,0x000306D1,0xFFFF0009,20131015
> +-# I,0x000306D2,0xFFFF0009,20131219
> +-# I,0x000306D3,0xE3121338,20140825
> +-# I,0x000306D4,0x0000002F,20191112
> +-# I,0x000306E0,0xE920080F,20121113
> +-# I,0x000306E2,0xE9220827,20130523
> +-# I,0x000306E3,0x00000308,20130321
> +-# I,0x000306E4,0x0000042E,20190314
> +-# I,0x000306E6,0x00000600,20130619
> +-# I,0x000306E7,0x00000715,20190314
> +-# I,0x000306F0,0xFFFF0017,20130730
> +-# I,0x000306F1,0xD141D629,20140416
> +-# I,0x000306F2,0x00000049,20210811
> +-# I,0x000306F3,0x0000000D,20160211
> +-# I,0x000306F4,0x0000001A,20210524
> +-# I,0x00040650,0xFFFF000B,20121206
> +-# I,0x00040651,0x00000026,20191112
> +-# I,0x00040660,0xFFFF0011,20121012
> +-# I,0x00040661,0x0000001C,20191112
> +-# I,0x00040670,0xFFFF0006,20140304
> +-# I,0x00040671,0x00000022,20191112
> +-# I,0x000406A0,0x80124001,20130521
> +-# I,0x000406A8,0x0000081F,20140812
> +-# I,0x000406A9,0x0000081F,20140812
> +-# I,0x000406C1,0x0000010B,20140814
> +-# I,0x000406C2,0x00000221,20150218
> +-# I,0x000406C3,0x00000368,20190423
> +-# I,0x000406C4,0x00000411,20190423
> +-# I,0x000406D0,0x0000000E,20130612
> +-# I,0x000406D8,0x0000012D,20190916
> +-# I,0x000406E1,0x00000020,20141111
> +-# I,0x000406E2,0x0000002C,20150521
> +-# I,0x000406E3,0x000000EC,20210428
> +-# I,0x000406E8,0x00000026,20160414
> +-# I,0x000406F0,0x00000014,20150702
> +-# I,0x000406F1,0x0B000040,20210519
> +-# I,0x00050650,0x8000002B,20160208
> +-# I,0x00050651,0x8000002B,20160208
> +-# I,0x00050652,0x80000037,20170502
> +-# I,0x00050653,0x0100015C,20210526
> +-# I,0x00050654,0x02006C0A,20210616
> +-# I,0x00050655,0x03000012,20190412
> +-# I,0x00050656,0x0400320A,20210813
> +-# I,0x00050657,0x0500320A,20210813
> +-# I,0x0005065A,0x86002302,20210416
> +-# I,0x0005065B,0x07002402,20210604
> +-# I,0x00050661,0xF1000008,20150130
> +-# I,0x00050662,0x0000001C,20190617
> +-# I,0x00050663,0x0700001C,20210612
> +-# I,0x00050664,0x0F00001A,20210612
> +-# I,0x00050665,0x0E000014,20210918
> +-# I,0x00050670,0xFFFF0030,20151113
> +-# I,0x00050671,0x000001B6,20180108
> +-# I,0x000506A0,0x00000038,20150112
> +-# I,0x000506C2,0x00000014,20180511
> +-# I,0x000506C8,0x90011010,20160323
> +-# I,0x000506C9,0x00000046,20210510
> +-# I,0x000506CA,0x00000022,20210622
> +-# I,0x000506D1,0x00000102,20150605
> +-# I,0x000506E0,0x00000018,20141119
> +-# I,0x000506E1,0x0000002A,20150602
> +-# I,0x000506E2,0x0000002E,20150815
> +-# I,0x000506E3,0x000000F0,20211112
> +-# I,0x000506E8,0x00000034,20160710
> +-# I,0x000506F0,0x00000010,20160607
> +-# I,0x000506F1,0x00000036,20210510
> +-# I,0x00060660,0x0000000C,20160821
> +-# I,0x00060661,0x0000000E,20170128
> +-# I,0x00060662,0x00000022,20171129
> +-# I,0x00060663,0x0000002A,20180417
> +-# I,0x000606A0,0x80000031,20200308
> +-# I,0x000606A4,0x0B000280,20200817
> +-# I,0x000606A5,0x0C0002F0,20210308
> +-# I,0x000606A6,0x0D000332,20211217
> +-# I,0x000606E0,0x0000000B,20161104
> +-# I,0x000606E1,0x00000108,20190423
> +-# I,0x000706A0,0x00000026,20170712
> +-# I,0x000706A1,0x00000038,20210510
> +-# I,0x000706A8,0x0000001C,20210510
> +-# I,0x000706E0,0x0000002C,20180614
> +-# I,0x000706E1,0x00000042,20190420
> +-# I,0x000706E2,0x00000042,20190420
> +-# I,0x000706E3,0x81000008,20181002
> +-# I,0x000706E4,0x00000046,20190905
> +-# I,0x000706E5,0x000000A8,20210526
> +-# I,0x00080650,0x00000018,20180108
> +-# I,0x00080664,0x0B00000F,20210217
> +-# I,0x00080665,0x0B00000F,20210217
> +-# I,0x000806A0,0x00000010,20190507
> +-# I,0x000806A1,0x0000002D,20210902
> +-# I,0x000806C0,0x00000068,20200402
> +-# I,0x000806C1,0x0000009C,20211026
> +-# I,0x000806C2,0x00000022,20210716
> +-# I,0x000806D0,0x00000050,20201217
> +-# I,0x000806D1,0x0000003C,20210716
> +-# I,0x000806E9,0x000000EC,20210428
> +-# I,0x000806EA,0x000000EC,20210428
> +-# I,0x000806EB,0x000000EC,20210428
> +-# I,0x000806EC,0x000000EC,20210428
> +-# I,0x00090660,0x00000009,20200617
> +-# I,0x00090661,0x00000015,20210921
> +-# I,0x00090670,0x00000019,20201111
> +-# I,0x00090671,0x0000001C,20210614
> +-# I,0x00090672,0x0000001F,20220303
> +-# I,0x00090674,0x00000219,20210425
> +-# I,0x00090675,0x0000001F,20220303
> +-# I,0x000906A0,0x0000001C,20210614
> +-# I,0x000906A1,0x0000011F,20211104
> +-# I,0x000906A2,0x00000315,20220102
> +-# I,0x000906A3,0x0000041B,20220308
> +-# I,0x000906A4,0x0000041B,20220308
> +-# I,0x000906C0,0x2400001F,20210809
> +-# I,0x000906E9,0x000000F0,20211112
> +-# I,0x000906EA,0x000000EC,20210428
> +-# I,0x000906EB,0x000000EC,20210428
> +-# I,0x000906EC,0x000000EC,20210428
> +-# I,0x000906ED,0x000000EC,20210428
> +-# I,0x000A0650,0x000000BE,20191010
> +-# I,0x000A0651,0x000000C2,20191113
> +-# I,0x000A0652,0x000000EC,20210428
> +-# I,0x000A0653,0x000000EC,20210428
> +-# I,0x000A0654,0x000000C6,20200123
> +-# I,0x000A0655,0x000000EE,20210428
> +-# I,0x000A0660,0x000000EA,20210428
> +-# I,0x000A0661,0x000000EC,20210429
> +-# I,0x000A0670,0x0000002C,20201124
> +-# I,0x000A0671,0x00000050,20210829
> +-# I,0x000A0680,0x80000002,20200121
> +-# I,0x000B0670,0x00000009,20211115
> +-# I,0x000B06F2,0x0000001F,20220303
> +-# I,0x000B06F5,0x0000001F,20220303
> +-# A,0x00000F00,0x02000008,20070614
> +-# A,0x00000F01,0x0000001C,20021031
> +-# A,0x00000F10,0x00000003,20020325
> +-# A,0x00000F11,0x0000001F,20030220
> +-# A,0x00000F48,0x00000046,20040719
> +-# A,0x00000F4A,0x00000047,20040719
> +-# A,0x00000F50,0x00000024,20021212
> +-# A,0x00000F51,0x00000025,20030115
> +-# A,0x00010F50,0x00000041,20040225
> +-# A,0x00020F10,0x0000004D,20050428
> +-# A,0x00040F01,0xC0012102,20050916
> +-# A,0x00040F0A,0x00000068,20060920
> +-# A,0x00040F13,0x0000007A,20080508
> +-# A,0x00040F14,0x00000062,20060127
> +-# A,0x00040F1B,0x0000006D,20060920
> +-# A,0x00040F33,0x0000007B,20080514
> +-# A,0x00060F80,0x00000083,20060929
> +-# A,0x000C0F1B,0x0000006E,20060921
> +-# A,0x000F0F00,0x00000005,20020627
> +-# A,0x000F0F01,0x00000015,20020627
> +-# A,0x00100F00,0x01000020,20070326
> +-# A,0x00100F20,0x010000CA,20100331
> +-# A,0x00100F22,0x010000C9,20100331
> +-# A,0x00100F40,0x01000085,20080501
> +-# A,0x00100F41,0x010000DB,20111024
> +-# A,0x00100F42,0x01000092,20081021
> +-# A,0x00100F43,0x010000C8,20100311
> +-# A,0x00100F62,0x010000C7,20100311
> +-# A,0x00100F80,0x010000DA,20111024
> +-# A,0x00100F81,0x010000D9,20111012
> +-# A,0x00100FA0,0x010000DC,20111024
> +-# A,0x00120F00,0x03000002,20100324
> +-# A,0x00200F30,0x02000018,20070921
> +-# A,0x00200F31,0x02000057,20080502
> +-# A,0x00200F32,0x02000034,20080307
> +-# A,0x00300F01,0x0300000E,20101004
> +-# A,0x00300F10,0x03000027,20111309
> +-# A,0x00500F00,0x0500000B,20100601
> +-# A,0x00500F01,0x0500001A,20100908
> +-# A,0x00500F10,0x05000029,20130121
> +-# A,0x00500F20,0x05000119,20130118
> +-# A,0x00580F00,0x0500000B,20100601
> +-# A,0x00580F01,0x0500001A,20100908
> +-# A,0x00580F10,0x05000028,20101124
> +-# A,0x00580F20,0x05000103,20110526
> +-# A,0x00600F00,0x06000017,20101029
> +-# A,0x00600F01,0x0600011F,20110227
> +-# A,0x00600F10,0x06000425,20110408
> +-# A,0x00600F11,0x0600050D,20110627
> +-# A,0x00600F12,0x0600063E,20180207
> +-# A,0x00600F20,0x06000852,20180206
> +-# A,0x00610F00,0x0600100E,20111102
> +-# A,0x00610F01,0x0600111F,20180305
> +-# A,0x00630F00,0x0600301C,20130817
> +-# A,0x00630F01,0x06003109,20180227
> +-# A,0x00660F00,0x06006012,20141014
> +-# A,0x00660F01,0x0600611A,20180126
> +-# A,0x00670F00,0x06006705,20180220
> +-# A,0x00680F00,0x06000017,20101029
> +-# A,0x00680F01,0x0600011F,20110227
> +-# A,0x00680F10,0x06000410,20110314
> +-# A,0x00690F00,0x06001009,20110613
> +-# A,0x00700F00,0x0700002A,20121218
> +-# A,0x00700F01,0x07000110,20180209
> +-# A,0x00730F00,0x07030009,20131206
> +-# A,0x00730F01,0x07030106,20180209
> +-# A,0x00800F00,0x0800002A,20161006
> +-# A,0x00800F10,0x0800100C,20170131
> +-# A,0x00800F11,0x08001138,20190204
> +-# A,0x00800F12,0x0800126E,20211111
> +-# A,0x00800F82,0x0800820D,20190416
> +-# A,0x00810F00,0x08100004,20161120
> +-# A,0x00810F10,0x08101016,20190430
> +-# A,0x00810F11,0x08101103,20190417
> +-# A,0x00810F80,0x08108002,20180605
> +-# A,0x00810F81,0x08108109,20190417
> +-# A,0x00820F00,0x08200002,20180214
> +-# A,0x00820F01,0x08200103,20190417
> +-# A,0x00830F00,0x08300027,20190401
> +-# A,0x00830F10,0x08301052,20211111
> +-# A,0x00850F00,0x08500004,20180212
> +-# A,0x00860F00,0x0860000E,20200127
> +-# A,0x00860F01,0x08600106,20200619
> +-# A,0x00860F81,0x08608103,20200702
> +-# A,0x00870F00,0x08700004,20181206
> +-# A,0x00870F10,0x08701021,20200125
> +-# A,0x00A00F00,0x0A000033,20200413
> +-# A,0x00A00F10,0x0A001053,20211217
> +-# A,0x00A00F11,0x0A00115D,20211119
> +-# A,0x00A00F12,0x0A001227,20211215
> +-# A,0x00A00F80,0x0A008003,20211015
> +-# A,0x00A00F82,0x0A008204,20211015
> +-# A,0x00A20F00,0x0A200025,20200121
> +-# A,0x00A20F10,0x0A201016,20210408
> +-# A,0x00A20F12,0x0A201205,20210719
> +-# A,0x00A50F00,0x0A50000C,20201208
> +--
> +2.38.1
> +
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-stage-
> commands-for-substitution.patch b/gnu/packages/patches/spectre-
> meltdown-checker-stage-commands-for-substitution.patch
> new file mode 100644
> index 0000000000..a2f13e4195
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-
> for-substitution.patch
> @@ -0,0 +1,1947 @@
> +From 4dc8ae01aec5a8a2aa2afc015603261d514620ae Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Fri, 11 Nov 2022 18:49:50 +0800
> +Subject: [PATCH 1/2] Stage commands for later substitution.
> +
> +awk, base64, basename, bunzip2, cat, cut, dd, dirname, dmesg, find,
> getent,
> +grep, gunzip, gzip, head, id, lz4, lzop, mktemp, modprobe, mount,
> nm,
> +nproc, objdump, od, perl, pgrep, readelf, rm, rmmod, sed, sort,
> stat,
> +strings, sysctl, tr, umount, uname, unlzma, unxz, unzstd, uuencode,
> which,
> +whoami, xargs.
> +---
> + spectre-meltdown-checker.sh | 648 ++++++++++++++++++---------------
> ---
> + 1 file changed, 324 insertions(+), 324 deletions(-)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 30f760c..82cf1b6 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -19,33 +19,33 @@ trap '_warn "interrupted, cleaning up...";
> exit_cleanup; exit 1' INT
> + exit_cleanup()
> + {
> + # cleanup the temp decompressed config & kernel image
> +- [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm
> -f "$dumped_config"
> +- [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm
> -f "$kerneltmp"
> +- [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm
> -f "$kerneltmp2"
> +- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm
> -f "$mcedb_tmp"
> +- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm
> -rf "$intel_tmp"
> +- [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug
> 2>/dev/null
> +- [ "${mounted_procfs:-}" = 1 ] && umount "$procfs"
> 2>/dev/null
> +- [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
> +- [ "${insmod_msr:-}" = 1 ] && rmmod msr 2>/dev/null
> ++ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] &&
> @rm@ -f "$dumped_config"
> ++ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] &&
> @rm@ -f "$kerneltmp"
> ++ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] &&
> @rm@ -f "$kerneltmp2"
> ++ [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] &&
> @rm@ -f "$mcedb_tmp"
> ++ [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] &&
> @rm@ -rf "$intel_tmp"
> ++ [ "${mounted_debugfs:-}" = 1 ] && @umount@ /sys/kernel/debug
> 2>/dev/null
> ++ [ "${mounted_procfs:-}" = 1 ] && @umount@ "$procfs"
> 2>/dev/null
> ++ [ "${insmod_cpuid:-}" = 1 ] && @rmmod@ cpuid 2>/dev/null
> ++ [ "${insmod_msr:-}" = 1 ] && @rmmod@ msr 2>/dev/null
> + [ "${kldload_cpuctl:-}" = 1 ] && kldunload cpuctl
> 2>/dev/null
> + [ "${kldload_vmm:-}" = 1 ] && kldunload vmm
> 2>/dev/null
> + }
> +
> + # if we were git clone'd, adjust VERSION
> +-if [ -d "$(dirname "$0")/.git" ] && command -v git >/dev/null 2>&1;
> then
> +- describe=$(git -C "$(dirname "$0")" describe --tags --dirty
> 2>/dev/null)
> +- [ -n "$describe" ] && VERSION=$(echo "$describe" | sed -e
> s/^v//)
> ++if [ -d "$(@dirname@ "$0")/.git" ] && command -v git >/dev/null
> 2>&1; then
> ++ describe=$(git -C "$(@dirname@ "$0")" describe --tags --dirty
> 2>/dev/null)
> ++ [ -n "$describe" ] && VERSION=$(echo "$describe" | @sed@ -e
> s/^v//)
> + fi
> +
> + show_usage()
> + {
> + # shellcheck disable=SC2086
> +- cat <<EOF
> ++ @cat@ <<EOF
> + Usage:
> +- Live mode (auto): $(basename $0) [options]
> +- Live mode (manual): $(basename $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
> +- Offline mode: $(basename $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
> ++ Live mode (auto): $(@basename@ $0) [options]
> ++ Live mode (manual): $(@basename@ $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
> ++ Offline mode: $(@basename@ $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
> +
> + Modes:
> + Two modes are available.
> +@@ -110,7 +110,7 @@ EOF
> +
> + show_disclaimer()
> + {
> +- cat <<EOF
> ++ @cat@ <<EOF
> + Disclaimer:
> +
> + This tool does its best to determine whether your system is immune
> (or has proper mitigations in place) for the
> +@@ -138,7 +138,7 @@ This tool has been released in the hope that
> it'll be useful, but don't use it t
> + EOF
> + }
> +
> +-os=$(uname -s)
> ++os=$(@uname@ -s)
> +
> + # parse options
> + opt_kernel=''
> +@@ -207,7 +207,7 @@ __echo()
> + _interpret_chars='-e'
> + fi
> + _ctrlchar=$($echo_cmd $_interpret_chars "\033")
> +- _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r
> "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
> ++ _msg=$($echo_cmd $_interpret_chars "$_msg" | @sed@ -r
> "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
> + fi
> + if [ "$echo_cmd_type" = printf ]; then
> + if [ "$opt" = "-n" ]; then
> +@@ -383,7 +383,7 @@ is_cpu_affected()
> + # https://github.com/crozone/SpectrePoC/issues/1 ^F
> E5200 => spectre 2 not affected
> + #
> https://github.com/paboldin/meltdown-exploit/issues/19 ^F E5200 =>
> meltdown affected
> + # model name : Pentium(R) Dual-Core CPU E5200
> @ 2.50GHz
> +- if echo "$cpu_friendly_name" | grep -qE 'Pentium\(R\)
> Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
> ++ if echo "$cpu_friendly_name" | @grep@ -qE
> 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
> + variant1=vuln
> + [ -z "$variant2" ] && variant2=immune
> + variant3=vuln
> +@@ -486,7 +486,7 @@ is_cpu_affected()
> + i=$(( i + 1 ))
> + # do NOT quote $cpu_arch_list below
> + # shellcheck disable=SC2086
> +- cpuarch=$(echo $cpu_arch_list | awk '{ print
> $'$i' }')
> ++ cpuarch=$(echo $cpu_arch_list | @awk@ '{
> print $'$i' }')
> + _debug "checking cpu$i: <$cpupart>
> <$cpuarch>"
> + # some kernels report AArch64 instead of 8
> + [ "$cpuarch" = "AArch64" ] && cpuarch=8
> +@@ -497,49 +497,49 @@ is_cpu_affected()
> + # part ? ? c08 c09 c0d c0f c0e d07
> d08 d09 d0a d0b d0c d0d
> + # arch 7? 7? 7 7 7 7 7 8
> 8 8 8 8 8 8
> + #
> +- # Whitelist identified non-affected
> processors, use vulnerability information from
> ++ # Whitelist identified non-affected
> processors, use vulnerability information from
> + #
> https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
> + # Partnumbers can be found here:
> + #
> https://github.com/gcc-mirror/gcc/blob/master/gcc/config/arm/arm-cpus.in
> + #
> + # Maintain cumulative check of
> vulnerabilities -
> + # if at least one of the cpu is
> affected, then the system is affected
> +- if [ "$cpuarch" = 7 ] && echo
> "$cpupart" | grep -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
> ++ if [ "$cpuarch" = 7 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + [ -z "$variant4" ] &&
> variant4=immune
> + _debug "checking cpu$i: armv7
> A8/A9/A12/A17 non affected to variants 3, 3a & 4"
> +- elif [ "$cpuarch" = 7 ] && echo
> "$cpupart" | grep -q -w -e 0xc0f; then
> ++ elif [ "$cpuarch" = 7 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xc0f; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + variant3a=vuln
> + [ -z "$variant4" ] &&
> variant4=immune
> + _debug "checking cpu$i: armv7
> A15 non affected to variants 3 & 4"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd07 -e 0xd08; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd07 -e 0xd08; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + variant3a=vuln
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A57/A72 non affected to variants 3"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd09; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd09; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A73 non affected to variants 3 & 3a"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd0a; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd0a; then
> + variant1=vuln
> + variant2=vuln
> + variant3=vuln
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A75 non affected to variant 3a"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
> + variant1=vuln
> + [ -z "$variant2" ] &&
> variant2=immune
> + [ -z "$variant3" ] &&
> variant3=immune
> +@@ -820,7 +820,7 @@ is_cpu_ssb_free()
> + if [ "$cpu_family" = "18" ] || \
> + [ "$cpu_family" = "17" ] || \
> + [ "$cpu_family" = "16" ] || \
> +- [ "$cpu_family" = "15" ]; then
> ++ [ "$cpu_family" = "15" ]; then
> + return 0
> + fi
> + fi
> +@@ -837,7 +837,7 @@ show_header()
> + _info
> + }
> +
> +-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
> ++[ -z "$HOME" ] && HOME="$(@getent@ passwd "$(@whoami@)" | @cut@ -d:
> -f6)"
> + mcedb_cache="$HOME/.mcedb"
> + update_fwdb()
> + {
> +@@ -846,11 +846,11 @@ update_fwdb()
> + set -e
> +
> + if [ -r "$mcedb_cache" ]; then
> +- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4
> }' "$mcedb_cache")
> ++ previous_dbversion=$(@awk@ '/^# %%% MCEDB / { print
> $4 }' "$mcedb_cache")
> + fi
> +
> + # first, download the MCE.db from the excellent platomav's
> MCExtractor project
> +- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
> ++ mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
> + mcedb_url='
> https://github.com/platomav/MCExtractor/raw/master/MCE.db'
> + _info_nol "Fetching MCE.db from the MCExtractor project... "
> + if command -v wget >/dev/null 2>&1; then
> +@@ -870,7 +870,7 @@ update_fwdb()
> + echo DONE
> +
> + # second, get the Intel firmwares from GitHub
> +- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
> ++ intel_tmp="$(@mktemp@ -d -t smc-intelfw-XXXXXX)"
> + intel_url="
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-
> Files/archive/main.zip"
> + _info_nol "Fetching Intel firmwares... "
> + ##
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
> +@@ -930,20 +930,20 @@ update_fwdb()
> + fi
> + # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev
> 0x0217, size 5120
> + # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev
> 0x0107, size 5120
> +- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-
> Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
> ++ $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-
> Data-Files-main/intel-ucode" | @grep@ -wF sig | while read -r _line
> + do
> +- _line=$( echo "$_line" | tr -d ',')
> +- _cpuid=$( echo "$_line" | awk '{print $3}')
> ++ _line=$( echo "$_line" | @tr@ -d ',')
> ++ _cpuid=$( echo "$_line" | @awk@ '{print $3}')
> + _cpuid=$(( _cpuid ))
> + _cpuid=$(printf "0x%08X" "$_cpuid")
> +- _date=$( echo "$_line" | awk '{print $6}' | tr -d
> '-')
> +- _version=$(echo "$_line" | awk '{print $8}')
> ++ _date=$( echo "$_line" | @awk@ '{print $6}' | @tr@
> -d '-')
> ++ _version=$(echo "$_line" | @awk@ '{print $8}')
> + _version=$(( _version ))
> + _version=$(printf "0x%08X" "$_version")
> + _sqlstm="$(printf "INSERT INTO Intel
> (origin,cpuid,version,yyyymmdd) VALUES
> (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")"
> "$(printf "%08X" "$_version")" "$_date")"
> + sqlite3 "$mcedb_tmp" "$_sqlstm"
> + done
> +- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-
> Processor-Microcode-Data-Files-main/license" 2>/dev/null)
> ++ _intel_timestamp=$(@stat@ -c %Y "$intel_tmp/Intel-Linux-
> Processor-Microcode-Data-Files-main/license" 2>/dev/null)
> + if [ -n "$_intel_timestamp" ]; then
> + # use this date, it matches the last commit date
> + _intel_latest_date=$(date +%Y%m%d -d
> @"$_intel_timestamp")
> +@@ -964,17 +964,17 @@ update_fwdb()
> + {
> + echo "# Spectre & Meltdown Checker";
> + echo "# %%% MCEDB v$dbversion";
> +- sqlite3 "$mcedb_tmp" "SELECT '#
> I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel
> AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
> +- sqlite3 "$mcedb_tmp" "SELECT '#
> A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD
> AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
> ++ sqlite3 "$mcedb_tmp" "SELECT '#
> I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel
> AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
> ++ sqlite3 "$mcedb_tmp" "SELECT '#
> A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD
> AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
> + } > "$mcedb_cache"
> + echo DONE "(version $dbversion)"
> +
> + if [ "$1" = builtin ]; then
> +- newfile=$(mktemp -t smc-builtin-XXXXXX)
> +- awk '/^# %%% MCEDB / { exit }; { print }' "$0" >
> "$newfile"
> +- awk '{ if (NR>1) { print } }' "$mcedb_cache" >>
> "$newfile"
> +- cat "$newfile" > "$0"
> +- rm -f "$newfile"
> ++ newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
> ++ @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" >
> "$newfile"
> ++ @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >>
> "$newfile"
> ++ @cat@ "$newfile" > "$0"
> ++ @rm@ -f "$newfile"
> + fi
> + }
> +
> +@@ -1055,7 +1055,7 @@ while [ -n "${1:-}" ]; do
> + elif [ "$1" = "--cpu" ]; then
> + opt_cpu=$2
> + if [ "$opt_cpu" != all ]; then
> +- if echo "$opt_cpu" | grep -Eq '^[0-9]+'; then
> ++ if echo "$opt_cpu" | @grep@ -Eq '^[0-9]+';
> then
> + opt_cpu=$(( opt_cpu ))
> + else
> + echo "$0: error: --cpu should be an
> integer or 'all', got '$opt_cpu'" >&2
> +@@ -1103,7 +1103,7 @@ while [ -n "${1:-}" ]; do
> + echo "$0: error: option --cve expects a
> parameter, supported CVEs are: $supported_cve_list" >&2
> + exit 255
> + fi
> +- selected_cve=$(echo "$supported_cve_list" | grep -iwo
> "$2")
> ++ selected_cve=$(echo "$supported_cve_list" | @grep@ -
> iwo "$2")
> + if [ -n "$selected_cve" ]; then
> + opt_cve_list="$opt_cve_list $selected_cve"
> + opt_cve_all=0
> +@@ -1308,14 +1308,14 @@ check_kernel()
> + # a damaged ELF file and validate it, check for stderr
> warnings too
> +
> + # the warning "readelf: Warning: [16]: Link field (0) should
> index a symtab section./" can appear on valid kernels, ignore it
> +- _readelf_warnings=$("${opt_arch_prefix}readelf" -S "$_file"
> 2>&1 >/dev/null | grep -v 'should index a symtab section' | tr "\n"
> "/"); ret=$?
> +- _readelf_sections=$("${opt_arch_prefix}readelf" -S "$_file"
> 2>/dev/null | grep -c -e data -e text -e init)
> +- _kernel_size=$(stat -c %s "$_file" 2>/dev/null || stat -f %z
> "$_file" 2>/dev/null || echo 10000)
> ++ _readelf_warnings=$("@readelf@" -S "$_file" 2>&1 >/dev/null |
> @grep@ -v 'should index a symtab section' | @tr@ "\n" "/"); ret=$?
> ++ _readelf_sections=$("@readelf@" -S "$_file" 2>/dev/null |
> @grep@ -c -e data -e text -e init)
> ++ _kernel_size=$(@stat@ -c %s "$_file" 2>/dev/null || @stat@ -f
> %z "$_file" 2>/dev/null || echo 10000)
> + _debug "check_kernel: ret=$? size=$_kernel_size
> sections=$_readelf_sections warnings=$_readelf_warnings"
> + if [ "$_mode" = desperate ]; then
> +- if "${opt_arch_prefix}strings" "$_file" | grep -Eq
> '^Linux version '; then
> ++ if "@strings@" "$_file" | @grep@ -Eq '^Linux version
> '; then
> + _debug "check_kernel (desperate): ...
> matched!"
> +- if [ "$_readelf_sections" = 0 ] && grep -qF -
> e armv6 -e armv7 "$_file"; then
> ++ if [ "$_readelf_sections" = 0 ] && @grep@ -qF
> -e armv6 -e armv7 "$_file"; then
> + _debug "check_kernel (desperate): raw
> arm binary found, adjusting objdump options"
> + objdump_options="-D -b binary -marm"
> + else
> +@@ -1348,7 +1348,7 @@ try_decompress()
> +
> + # Try to find the header ($1) and decompress from here
> + _debug "try_decompress: looking for $3 magic in $6"
> +- for pos in $(tr "$1\n$2" "\n$2=" < "$6" | grep -abo
> "^$2")
> ++ for pos in $(@tr@ "$1\n$2" "\n$2=" < "$6" | @grep@ -abo
> "^$2")
> + do
> + _debug "try_decompress: magic for $3 found at offset
> $pos"
> + if ! command -v "$3" >/dev/null 2>&1; then
> +@@ -1375,11 +1375,11 @@ try_decompress()
> + kernel="$kerneltmp"
> + _debug "try_decompress: decompressed with $3
> successfully!"
> + return 0
> +- elif [ "$3" != "cat" ]; then
> ++ elif [ "$3" != "@cat@" ]; then
> + _debug "try_decompress: decompression with $3
> worked but result is not a kernel, trying with an offset"
> +- [ -z "$kerneltmp2" ] && kerneltmp2=$(mktemp -
> t smc-kernel-XXXXXX)
> +- cat "$kerneltmp" > "$kerneltmp2"
> +- try_decompress '\177ELF' xxy 'cat' '' cat
> "$kerneltmp2" && return 0
> ++ [ -z "$kerneltmp2" ] && kerneltmp2=$(@mktemp@
> -t smc-kernel-XXXXXX)
> ++ @cat@ "$kerneltmp" > "$kerneltmp2"
> ++ try_decompress '\177ELF' xxy '@cat@' '' cat
> "$kerneltmp2" && return 0
> + else
> + _debug "try_decompress: decompression with $3
> worked but result is not a kernel"
> + fi
> +@@ -1391,12 +1391,12 @@ extract_kernel()
> + {
> + [ -n "${1:-}" ] || return 1
> + # Prepare temp files:
> +- kerneltmp="$(mktemp -t smc-kernel-XXXXXX)"
> ++ kerneltmp="$(@mktemp@ -t smc-kernel-XXXXXX)"
> +
> + # Initial attempt for uncompressed images or objects:
> + if check_kernel "$1"; then
> + _debug "extract_kernel: found kernel is valid, no
> decompression needed"
> +- cat "$1" > "$kerneltmp"
> ++ @cat@ "$1" > "$kerneltmp"
> + kernel=$kerneltmp
> + return 0
> + fi
> +@@ -1405,14 +1405,14 @@ extract_kernel()
> + for pass in 1 2; do
> + for mode in normal desperate; do
> + _debug "extract_kernel: pass $pass $mode
> mode"
> +- try_decompress '\037\213\010' xy
> gunzip '' gunzip "$1" "$mode" "$pass" && return 0
> +- try_decompress '\002\041\114\030' xyy
> 'lz4' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
> +- try_decompress '\3757zXZ\000' abcde
> unxz '' xz-utils "$1" "$mode" "$pass" && return 0
> +- try_decompress 'BZh' xy
> bunzip2 '' bzip2 "$1" "$mode" "$pass" && return 0
> +- try_decompress '\135\0\0\0' xxx
> unlzma '' xz-utils "$1" "$mode" "$pass" && return 0
> +- try_decompress '\211\114\132' xy
> 'lzop' '-d' lzop "$1" "$mode" "$pass" && return 0
> +- try_decompress '\177ELF' xxy
> 'cat' '' cat "$1" "$mode" "$pass" && return 0
> +- try_decompress '(\265/\375' xxy
> unzstd '' zstd "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\037\213\010' xy
> @gunzip@ '' gunzip "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\002\041\114\030' xyy
> '@lz4@' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\3757zXZ\000' abcde
> @unxz@ '' xz-utils "$1" "$mode" "$pass" && return 0
> ++ try_decompress 'BZh' xy
> @bunzip2@ '' bzip2 "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\135\0\0\0' xxx
> @unlzma@ '' xz-utils "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\211\114\132' xy
> '@lzop@' '-d' lzop "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\177ELF' xxy
> '@cat@' '' cat "$1" "$mode" "$pass" && return 0
> ++ try_decompress '(\265/\375' xxy
> @unzstd@ '' zstd "$1" "$mode" "$pass" && return 0
> + done
> + done
> + # kernel_err might already have been populated by
> try_decompress() if we're missing one of the tools
> +@@ -1429,7 +1429,7 @@ mount_debugfs()
> + {
> + if [ ! -e /sys/kernel/debug/sched_features ]; then
> + # try to mount the debugfs hierarchy ourselves and
> remember it to umount afterwards
> +- mount -t debugfs debugfs /sys/kernel/debug
> 2>/dev/null && mounted_debugfs=1
> ++ @mount@ -t debugfs debugfs /sys/kernel/debug
> 2>/dev/null && mounted_debugfs=1
> + fi
> + }
> +
> +@@ -1440,12 +1440,12 @@ load_msr()
> + load_msr_once=1
> +
> + if [ "$os" = Linux ]; then
> +- if ! grep -qw msr "$procfs/modules" 2>/dev/null; then
> +- modprobe msr 2>/dev/null && insmod_msr=1
> ++ if ! @grep@ -qw msr "$procfs/modules" 2>/dev/null;
> then
> ++ @modprobe@ msr 2>/dev/null && insmod_msr=1
> + _debug "attempted to load module msr,
> insmod_msr=$insmod_msr"
> + else
> + _debug "msr module already loaded"
> +- fi
> ++ fi
> + else
> + if ! kldstat -q -m cpuctl; then
> + kldload cpuctl 2>/dev/null &&
> kldload_cpuctl=1
> +@@ -1463,12 +1463,12 @@ load_cpuid()
> + load_cpuid_once=1
> +
> + if [ "$os" = Linux ]; then
> +- if ! grep -qw cpuid "$procfs/modules" 2>/dev/null;
> then
> +- modprobe cpuid 2>/dev/null && insmod_cpuid=1
> ++ if ! @grep@ -qw cpuid "$procfs/modules" 2>/dev/null;
> then
> ++ @modprobe@ cpuid 2>/dev/null &&
> insmod_cpuid=1
> + _debug "attempted to load module cpuid,
> insmod_cpuid=$insmod_cpuid"
> + else
> + _debug "cpuid module already loaded"
> +- fi
> ++ fi
> + else
> + if ! kldstat -q -m cpuctl; then
> + kldload cpuctl 2>/dev/null &&
> kldload_cpuctl=1
> +@@ -1557,7 +1557,7 @@ read_cpuid_one_core()
> + fi
> + # on some kernel versions, /dev/cpu/0/cpuid doesn't
> imply that the cpuid module is loaded, in that case dd returns an
> error,
> + # we use that fact to load the module if dd returns
> an error
> +- if ! dd if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null
> 2>&1; then
> ++ if ! @dd@ if=/dev/cpu/0/cpuid bs=16 count=1
> >/dev/null 2>&1; then
> + load_cpuid
> + fi
> + # we need _leaf to be converted to decimal for dd
> +@@ -1568,14 +1568,14 @@ read_cpuid_one_core()
> + _ddskip=$(( _position / 16 ))
> + _odskip=$(( _position - _ddskip * 16 ))
> + # now read the value
> +- _cpuid=$(dd if="/dev/cpu/$_core/cpuid" bs=16
> skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | od -j $((_odskip *
> 16)) -A n -t u4)
> ++ _cpuid=$(@dd@ if="/dev/cpu/$_core/cpuid" bs=16
> skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | @od@ -j $((_odskip
> * 16)) -A n -t u4)
> + elif [ -e /dev/cpuctl0 ]; then
> + # BSD
> + if [ ! -r /dev/cpuctl0 ]; then
> + read_cpuid_msg="Couldn't read cpuid info from
> cpuctl"
> + return $READ_CPUID_RET_ERR
> + fi
> +- _cpuid=$(cpucontrol -i "$_leaf","$_subleaf"
> "/dev/cpuctl$_core" 2>/dev/null | cut -d: -f2-)
> ++ _cpuid=$(cpucontrol -i "$_leaf","$_subleaf"
> "/dev/cpuctl$_core" 2>/dev/null | @cut@ -d: -f2-)
You're missing cpucontrol here.
> + # cpuid level 0x4, level_type 0x2: 0x1c004143
> 0x01c0003f 0x000001ff 0x00000000
> + else
> + read_cpuid_msg="Found no way to read cpuid info"
> +@@ -1598,7 +1598,7 @@ read_cpuid_one_core()
> + fi
> +
> + # get the value of the register we want
> +- _reg=$(echo "$_cpuid" | awk '{print $'"$_register"'}')
> ++ _reg=$(echo "$_cpuid" | @awk@ '{print $'"$_register"'}')
> + # Linux returns it as decimal, BSD as hex, normalize to
> decimal
> + _reg=$(( _reg ))
> + # shellcheck disable=SC2046
> +@@ -1626,11 +1626,11 @@ dmesg_grep()
> + # grep for something in dmesg, ensuring that the dmesg buffer
> + # has not been truncated
> + dmesg_grepped=''
> +- if ! dmesg | grep -qE -e '(^|\] )Linux version [0-9]' -e
> '^FreeBSD is a registered' ; then
> ++ if ! @dmesg@ | @grep@ -qE -e '(^|\] )Linux version [0-9]' -e
> '^FreeBSD is a registered' ; then
> + # dmesg truncated
> + return 2
> + fi
> +- dmesg_grepped=$(dmesg | grep -E "$1" | head -1)
> ++ dmesg_grepped=$(@dmesg@ | @grep@ -E "$1" | @head@ -1)
> + # not found:
> + [ -z "$dmesg_grepped" ] && return 1
> + # found, output is in $dmesg_grepped
> +@@ -1647,12 +1647,12 @@ parse_cpu_details()
> + {
> + [ "${parse_cpu_details_done:-}" = 1 ] && return 0
> +
> +- if command -v nproc >/dev/null; then
> +- number_of_cores=$(nproc)
> +- elif echo "$os" | grep -q BSD; then
> +- number_of_cores=$(sysctl -n hw.ncpu 2>/dev/null ||
> echo 1)
> ++ if command -v @nproc@ >/dev/null; then
> ++ number_of_cores=$(@nproc@)
> ++ elif echo "$os" | @grep@ -q BSD; then
> ++ number_of_cores=$(@sysctl@ -n hw.ncpu 2>/dev/null ||
> echo 1)
> + elif [ -e "$procfs/cpuinfo" ]; then
> +- number_of_cores=$(grep -c ^processor
> "$procfs/cpuinfo" 2>/dev/null || echo 1)
> ++ number_of_cores=$(@grep@ -c ^processor
> "$procfs/cpuinfo" 2>/dev/null || echo 1)
> + else
> + # if we don't know, default to 1 CPU
> + number_of_cores=1
> +@@ -1660,43 +1660,43 @@ parse_cpu_details()
> + max_core_id=$(( number_of_cores - 1 ))
> +
> + if [ -e "$procfs/cpuinfo" ]; then
> +- cpu_vendor=$( grep '^vendor_id' "$procfs/cpuinfo" |
> awk '{print $3}' | head -1)
> +- cpu_friendly_name=$(grep '^model name'
> "$procfs/cpuinfo" | cut -d: -f2- | head -1 | sed -e 's/^ *//')
> ++ cpu_vendor=$( @grep@ '^vendor_id' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @head@ -1)
> ++ cpu_friendly_name=$(@grep@ '^model name'
> "$procfs/cpuinfo" | @cut@ -d: -f2- | @head@ -1 | @sed@ -e 's/^ *//')
> + # special case for ARM follows
> +- if grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
> ++ if @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
> + cpu_vendor='ARM'
> + # some devices (phones or other) have several
> ARMs and as such different part numbers,
> + # an example is "bigLITTLE", so we need to
> store the whole list, this is needed for is_cpu_affected
> +- cpu_part_list=$(awk '/CPU part/
> {print $4}' "$procfs/cpuinfo")
> +- cpu_arch_list=$(awk '/CPU architecture/
> {print $3}' "$procfs/cpuinfo")
> ++ cpu_part_list=$(@awk@ '/CPU part/
> {print $4}' "$procfs/cpuinfo")
> ++ cpu_arch_list=$(@awk@ '/CPU architecture/
> {print $3}' "$procfs/cpuinfo")
> + # take the first one to fill the friendly
> name, do NOT quote the vars below
> + # shellcheck disable=SC2086
> +- cpu_arch=$(echo $cpu_arch_list | awk '{ print
> $1 }')
> ++ cpu_arch=$(echo $cpu_arch_list | @awk@ '{
> print $1 }')
> + # shellcheck disable=SC2086
> +- cpu_part=$(echo $cpu_part_list | awk '{ print
> $1 }')
> ++ cpu_part=$(echo $cpu_part_list | @awk@ '{
> print $1 }')
> + [ "$cpu_arch" = "AArch64" ] && cpu_arch=8
> + cpu_friendly_name="ARM"
> + [ -n "$cpu_arch" ] &&
> cpu_friendly_name="$cpu_friendly_name v$cpu_arch"
> + [ -n "$cpu_part" ] &&
> cpu_friendly_name="$cpu_friendly_name model $cpu_part"
> +
> +- elif grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
> ++ elif @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
> + cpu_vendor='CAVIUM'
> +- elif grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
> ++ elif @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
> + cpu_vendor='PHYTIUM'
> + fi
> +
> +- cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" |
> awk '{print $4}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_model=$( grep '^model' "$procfs/cpuinfo" |
> awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_stepping=$(grep '^stepping' "$procfs/cpuinfo" |
> awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_ucode=$( grep '^microcode' "$procfs/cpuinfo" |
> awk '{print $3}' | head -1)
> ++ cpu_family=$( @grep@ '^cpu family' "$procfs/cpuinfo"
> | @awk@ '{print $4}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_model=$( @grep@ '^model' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_stepping=$(@grep@ '^stepping' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_ucode=$( @grep@ '^microcode' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @head@ -1)
> + else
> +- cpu_vendor=$( dmesg | grep -i -m1 'Origin=' | cut -f2
> -w | cut -f2 -d= | cut -f2 -d\" )
> +- cpu_family=$( dmesg | grep -i -m1 'Family=' | cut -f4
> -w | cut -f2 -d= )
> ++ cpu_vendor=$( @dmesg@ | @grep@ -i -m1 'Origin=' |
> @cut@ -f2 -w | @cut@ -f2 -d= | @cut@ -f2 -d\" )
> ++ cpu_family=$( @dmesg@ | @grep@ -i -m1 'Family=' |
> @cut@ -f4 -w | @cut@ -f2 -d= )
> + cpu_family=$(( cpu_family ))
> +- cpu_model=$( dmesg | grep -i -m1 'Model=' | cut -f5 -
> w | cut -f2 -d= )
> ++ cpu_model=$( @dmesg@ | @grep@ -i -m1 'Model=' | @cut@
> -f5 -w | @cut@ -f2 -d= )
> + cpu_model=$(( cpu_model ))
> +- cpu_stepping=$( dmesg | grep -i -m1 'Stepping=' | cut
> -f6 -w | cut -f2 -d= )
> +- cpu_friendly_name=$(sysctl -n hw.model 2>/dev/null)
> ++ cpu_stepping=$( @dmesg@ | @grep@ -i -m1 'Stepping=' |
> @cut@ -f6 -w | @cut@ -f2 -d= )
> ++ cpu_friendly_name=$(@sysctl@ -n hw.model 2>/dev/null)
> + fi
> +
> + if [ -n "${SMC_MOCK_CPU_FRIENDLY_NAME:-}" ]; then
> +@@ -1751,7 +1751,7 @@ parse_cpu_details()
> + # call CPUID
> + cpucontrol -i 1 /dev/cpuctl0 >/dev/null
> + # read MSR
> +- cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 |
> awk '{print $3}')
> ++ cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 |
> @awk@ '{print $3}')
> + # convert to decimal
> + cpu_ucode=$(( cpu_ucode ))
> + # convert back to hex
> +@@ -1770,7 +1770,7 @@ parse_cpu_details()
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_CPU_UCODE='$cpu_ucode'")
> + fi
> +
> +- echo "$cpu_ucode" | grep -q ^0x && cpu_ucode=$(( cpu_ucode ))
> ++ echo "$cpu_ucode" | @grep@ -q ^0x && cpu_ucode=$(( cpu_ucode
> ))
> + ucode_found=$(printf "family 0x%x model 0x%x stepping 0x%x
> ucode 0x%x cpuid 0x%x" "$cpu_family" "$cpu_model" "$cpu_stepping"
> "$cpu_ucode" "$cpu_cpuid")
> +
> + # also define those that we will need in other funcs
> +@@ -1867,8 +1867,8 @@ is_cpu_smt_enabled()
> + {
> + # SMT / HyperThreading is enabled if siblings != cpucores
> + if [ -e "$procfs/cpuinfo" ]; then
> +- _siblings=$(awk '/^siblings/ {print $3;exit}'
> "$procfs/cpuinfo")
> +- _cpucores=$(awk '/^cpu cores/ {print $4;exit}'
> "$procfs/cpuinfo")
> ++ _siblings=$(@awk@ '/^siblings/ {print $3;exit}'
> "$procfs/cpuinfo")
> ++ _cpucores=$(@awk@ '/^cpu cores/ {print $4;exit}'
> "$procfs/cpuinfo")
> + if [ -n "$_siblings" ] && [ -n "$_cpucores" ]; then
> + if [ "$_siblings" = "$_cpucores" ]; then
> + return 1
> +@@ -1916,10 +1916,10 @@ is_ucode_blacklisted()
> + $INTEL_FAM6_SANDYBRIDGE_X,0x06,0x61b \
> + $INTEL_FAM6_SANDYBRIDGE_X,0x07,0x712
> + do
> +- model=$(echo "$tuple" | cut -d, -f1)
> +- stepping=$(( $(echo "$tuple" | cut -d, -f2) ))
> ++ model=$(echo "$tuple" | @cut@ -d, -f1)
> ++ stepping=$(( $(echo "$tuple" | @cut@ -d, -f2) ))
> + if [ "$cpu_model" = "$model" ] && [ "$cpu_stepping" =
> "$stepping" ]; then
> +- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
> ++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
> + if [ "$cpu_ucode" = "$ucode" ]; then
> + _debug "is_ucode_blacklisted: we have
> a match! ($cpu_model/$cpu_stepping/$cpu_ucode)"
> + return 0
> +@@ -2007,7 +2007,7 @@ is_xen_dom0()
> + return 1
> + fi
> +
> +- if [ -e "$procfs/xen/capabilities" ] && grep -q "control_d"
> "$procfs/xen/capabilities"; then
> ++ if [ -e "$procfs/xen/capabilities" ] && @grep@ -q "control_d"
> "$procfs/xen/capabilities"; then
> + return 0
> + else
> + return 1
> +@@ -2033,12 +2033,12 @@ is_xen_domU()
> + fi
> + }
> +
> +-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
> ++builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
> + if [ -r "$mcedb_cache" ]; then
> + # we have a local cache file, but it might be older than the
> builtin version we have
> +- local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> ++ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> + # sort -V sorts by version number
> +- older_dbversion=$(printf "%b\n%b" "$local_dbversion"
> "$builtin_dbversion" | sort -V | head -n1)
> ++ older_dbversion=$(printf "%b\n%b" "$local_dbversion"
> "$builtin_dbversion" | @sort@ -V | @head@ -n1)
> + if [ "$older_dbversion" = "$builtin_dbversion" ]; then
> + mcedb_source="$mcedb_cache"
> + mcedb_info="local firmwares DB $local_dbversion"
> +@@ -2051,7 +2051,7 @@ if [ -z "${mcedb_source:-}" ]; then
> + fi
> + read_mcedb()
> + {
> +- awk '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1
> }' "$mcedb_source"
> ++ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / {
> DELIM=1 }' "$mcedb_source"
> + }
> +
> + is_latest_known_ucode()
> +@@ -2070,10 +2070,10 @@ is_latest_known_ucode()
> + else
> + return 2
> + fi
> +- for tuple in $(read_mcedb | grep "$(printf
> "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
> ++ for tuple in $(read_mcedb | @grep@ "$(printf
> "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
> + do
> +- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
> +- ucode_date=$(echo "$tuple" | cut -d, -f4 | sed -r
> 's=(....)(..)(..)=\1/\2/\3=')
> ++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
> ++ ucode_date=$(echo "$tuple" | @cut@ -d, -f4 | @sed@ -r
> 's=(....)(..)(..)=\1/\2/\3=')
> + _debug "is_latest_known_ucode: with cpuid $cpu_cpuid
> has ucode $cpu_ucode, last known is $ucode from $ucode_date"
> + ucode_latest=$(printf "latest version is 0x%x dated
> $ucode_date according to $mcedb_info" "$ucode")
> + if [ "$cpu_ucode" -ge "$ucode" ]; then
> +@@ -2098,7 +2098,7 @@ get_cmdline()
> + kernel_cmdline="$SMC_MOCK_CMDLINE"
> + return
> + else
> +- kernel_cmdline=$(cat "$procfs/cmdline")
> ++ kernel_cmdline=$(@cat@ "$procfs/cmdline")
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_CMDLINE='$kernel_cmdline'")
> + fi
> + }
> +@@ -2106,7 +2106,7 @@ get_cmdline()
> + # ENTRYPOINT
> +
> + # we can't do anything useful under WSL
> +-if uname -a | grep -qE -- '-Microsoft #[0-9]+-Microsoft '; then
> ++if @uname@ -a | @grep@ -qE -- '-Microsoft #[0-9]+-Microsoft '; then
> + _warn "This script doesn't work under Windows Subsystem for
> Linux"
> + _warn "You should use the official Microsoft tool instead."
> + _warn "It can be found under
> https://aka.ms/SpeculationControlPS"
> +@@ -2155,15 +2155,15 @@ fi
> +
> + # if we're under a BSD, try to mount linprocfs for
> "$procfs/cpuinfo"
> + procfs=/proc
> +-if echo "$os" | grep -q BSD; then
> ++if echo "$os" | @grep@ -q BSD; then
> + _debug "We're under BSD, check if we have procfs"
> +- procfs=$(mount | awk '/^linprocfs/ { print $3; exit; }')
> ++ procfs=$(@mount@ | @awk@ '/^linprocfs/ { print $3; exit; }')
> + if [ -z "$procfs" ]; then
> + _debug "we don't, try to mount it"
> + procfs=/proc
> + [ -d /compat/linux/proc ] &&
> procfs=/compat/linux/proc
> + test -d $procfs || mkdir $procfs
> +- if mount -t linprocfs linprocfs $procfs 2>/dev/null;
> then
> ++ if @mount@ -t linprocfs linprocfs $procfs
> 2>/dev/null; then
> + mounted_procfs=1
> + _debug "procfs just mounted at $procfs"
> + else
> +@@ -2195,14 +2195,14 @@ fi
> +
> + if [ "$opt_live" = 1 ]; then
> + # root check (only for live mode, for offline mode, we
> already checked if we could read the files)
> +- if [ "$(id -u)" -ne 0 ]; then
> ++ if [ "$(@id@ -u)" -ne 0 ]; then
> + _warn "Note that you should launch this script with
> root privileges to get accurate information."
> + _warn "We'll proceed but you might see permission
> denied errors."
> + _warn "To run it as root, you can try the following
> command: sudo $0"
> + _warn
> + fi
> + _info "Checking for vulnerabilities on current system"
> +- _info "Kernel is \033[35m$os $(uname -r) $(uname -v) $(uname
> -m)\033[0m"
> ++ _info "Kernel is \033[35m$os $(@uname@ -r) $(@uname@ -v)
> $(@uname@ -m)\033[0m"
> + _info "CPU is \033[35m$cpu_friendly_name\033[0m"
> +
> + # try to find the image of the current running kernel
> +@@ -2210,12 +2210,12 @@ if [ "$opt_live" = 1 ]; then
> + # specified by user on cmdline, with --live, don't
> override
> + :
> + # first, look for the BOOT_IMAGE hint in the kernel cmdline
> +- elif echo "$kernel_cmdline" | grep -q 'BOOT_IMAGE='; then
> +- opt_kernel=$(echo "$kernel_cmdline" | grep -Eo
> 'BOOT_IMAGE=[^ ]+' | cut -d= -f2)
> ++ elif echo "$kernel_cmdline" | @grep@ -q 'BOOT_IMAGE='; then
> ++ opt_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo
> 'BOOT_IMAGE=[^ ]+' | @cut@ -d= -f2)
> + _debug "found opt_kernel=$opt_kernel in
> $procfs/cmdline"
> + # if the boot partition is within a btrfs subvolume,
> strip the subvolume name
> + # if /boot is a separate subvolume, the remainder of
> the code in this section should handle it
> +- if echo "$opt_kernel" | grep -q "^/@"; then
> opt_kernel=$(echo "$opt_kernel" | sed "s:/@[^/]*::"); fi
> ++ if echo "$opt_kernel" | @grep@ -q "^/@"; then
> opt_kernel=$(echo "$opt_kernel" | @sed@ "s:/@[^/]*::"); fi
> + # if we have a dedicated /boot partition, our
> bootloader might have just called it /
> + # so try to prepend /boot and see if we find anything
> + [ -e "/boot/$opt_kernel" ] &&
> opt_kernel="/boot/$opt_kernel"
> +@@ -2227,7 +2227,7 @@ if [ "$opt_live" = 1 ]; then
> + # if we didn't find a kernel, default to guessing
> + if [ ! -e "$opt_kernel" ]; then
> + # Fedora:
> +- [ -e "/lib/modules/$(uname -r)/vmlinuz" ] &&
> opt_kernel="/lib/modules/$(uname -r)/vmlinuz"
> ++ [ -e "/lib/modules/$(@uname@ -r)/vmlinuz" ] &&
> opt_kernel="/lib/modules/$(@uname@ -r)/vmlinuz"
> + # Slackware:
> + [ -e "/boot/vmlinuz" ] &&
> opt_kernel="/boot/vmlinuz"
> + # Arch aarch64:
> +@@ -2241,24 +2241,24 @@ if [ "$opt_live" = 1 ]; then
> + # pine64
> + [ -e "/boot/pine64/Image" ] &&
> opt_kernel="/boot/pine64/Image"
> + # generic:
> +- [ -e "/boot/vmlinuz-$(uname -r)" ] &&
> opt_kernel="/boot/vmlinuz-$(uname -r)"
> +- [ -e "/boot/kernel-$( uname -r)" ] &&
> opt_kernel="/boot/kernel-$( uname -r)"
> +- [ -e "/boot/bzImage-$(uname -r)" ] &&
> opt_kernel="/boot/bzImage-$(uname -r)"
> ++ [ -e "/boot/vmlinuz-$(@uname@ -r)" ] &&
> opt_kernel="/boot/vmlinuz-$(@uname@ -r)"
> ++ [ -e "/boot/kernel-$( @uname@ -r)" ] &&
> opt_kernel="/boot/kernel-$( @uname@ -r)"
> ++ [ -e "/boot/bzImage-$(@uname@ -r)" ] &&
> opt_kernel="/boot/bzImage-$(@uname@ -r)"
> + # Gentoo:
> +- [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ++ [ -e "/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@
> -r)" ] && opt_kernel="/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@
> -r)"
> + # NixOS:
> + [ -e "/run/booted-system/kernel" ] &&
> opt_kernel="/run/booted-system/kernel"
> + # Guix System:
> + [ -e "/run/booted-system/kernel/bzImage" ] &&
> opt_kernel="/run/booted-system/kernel/bzImage"
> + # systemd kernel-install:
> +- [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux"
> ++ [ -e "/etc/machine-id" ] && [ -e "/boot/$(@cat@
> /etc/machine-id)/$(@uname@ -r)/linux" ] && opt_kernel="/boot/$(@cat@
> /etc/machine-id)/$(@uname@ -r)/linux"
> + # Clear Linux:
> +- str_uname=$(uname -r)
> ++ str_uname=$(@uname@ -r)
> + clear_linux_kernel="/lib/kernel/org.clearlinux.${str_
> uname##*.}.${str_uname%.*}"
> + [ -e "$clear_linux_kernel" ] &&
> opt_kernel=$clear_linux_kernel
> + # Custom Arch seems to have the kernel path in its
> cmdline in the form "\directory\kernelimage",
> + # with actual \'s instead of /'s:
> +- custom_arch_kernel=$(echo "$kernel_cmdline" | grep -
> Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | tr "\\\\" "/" | tr -d
> '[:space:]')
> ++ custom_arch_kernel=$(echo "$kernel_cmdline" | @grep@
> -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | @tr@ "\\\\" "/" | @tr@ -d
> '[:space:]')
> + if [ -n "$custom_arch_kernel" ] && [ -e
> "$custom_arch_kernel" ]; then
> + opt_kernel="$custom_arch_kernel"
> + fi
> +@@ -2272,12 +2272,12 @@ if [ "$opt_live" = 1 ]; then
> + :
> + elif [ -e "$procfs/kallsyms" ] ; then
> + opt_map="$procfs/kallsyms"
> +- elif [ -e "/lib/modules/$(uname -r)/System.map" ] ; then
> +- opt_map="/lib/modules/$(uname -r)/System.map"
> +- elif [ -e "/boot/System.map-$(uname -r)" ] ; then
> +- opt_map="/boot/System.map-$(uname -r)"
> +- elif [ -e "/lib/kernel/System.map-$(uname -r)" ]; then
> +- opt_map="/lib/kernel/System.map-$(uname -r)"
> ++ elif [ -e "/lib/modules/$(@uname@ -r)/System.map" ] ; then
> ++ opt_map="/lib/modules/$(@uname@ -r)/System.map"
> ++ elif [ -e "/boot/System.map-$(@uname@ -r)" ] ; then
> ++ opt_map="/boot/System.map-$(@uname@ -r)"
> ++ elif [ -e "/lib/kernel/System.map-$(@uname@ -r)" ]; then
> ++ opt_map="/lib/kernel/System.map-$(@uname@ -r)"
> + fi
> +
> + # config
> +@@ -2285,18 +2285,18 @@ if [ "$opt_live" = 1 ]; then
> + # specified by user on cmdline, with --live, don't
> override
> + :
> + elif [ -e "$procfs/config.gz" ] ; then
> +- dumped_config="$(mktemp -t smc-config-XXXXXX)"
> +- gunzip -c "$procfs/config.gz" > "$dumped_config"
> ++ dumped_config="$(@mktemp@ -t smc-config-XXXXXX)"
> ++ @gunzip@ -c "$procfs/config.gz" > "$dumped_config"
> + # dumped_config will be deleted at the end of the
> script
> + opt_config="$dumped_config"
> +- elif [ -e "/lib/modules/$(uname -r)/config" ]; then
> +- opt_config="/lib/modules/$(uname -r)/config"
> +- elif [ -e "/boot/config-$(uname -r)" ]; then
> +- opt_config="/boot/config-$(uname -r)"
> +- elif [ -e "/etc/kernels/kernel-config-$(uname -m)-$(uname -
> r)" ]; then
> +- opt_config="/etc/kernels/kernel-config-$(uname -m)-
> $(uname -r)"
> +- elif [ -e "/lib/kernel/config-$(uname -r)" ]; then
> +- opt_config="/lib/kernel/config-$(uname -r)"
> ++ elif [ -e "/lib/modules/$(@uname@ -r)/config" ]; then
> ++ opt_config="/lib/modules/$(@uname@ -r)/config"
> ++ elif [ -e "/boot/config-$(@uname@ -r)" ]; then
> ++ opt_config="/boot/config-$(@uname@ -r)"
> ++ elif [ -e "/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@
> -r)" ]; then
> ++ opt_config="/etc/kernels/kernel-config-$(@uname@ -m)-
> $(@uname@ -r)"
> ++ elif [ -e "/lib/kernel/config-$(@uname@ -r)" ]; then
> ++ opt_config="/lib/kernel/config-$(@uname@ -r)"
> + fi
> + else
> + _info "Checking for vulnerabilities against specified kernel"
> +@@ -2311,7 +2311,7 @@ else
> + fi
> +
> + if [ "$os" = Linux ]; then
> +- if [ -n "$opt_config" ] && ! grep -q '^CONFIG_'
> "$opt_config"; then
> ++ if [ -n "$opt_config" ] && ! @grep@ -q '^CONFIG_'
> "$opt_config"; then
> + # given file is invalid!
> + _warn "The kernel config file seems invalid, was
> expecting a plain-text file, ignoring it!"
> + opt_config=''
> +@@ -2339,7 +2339,7 @@ if [ "$os" = Linux ]; then
> + fi
> +
> + if [ -e "$opt_kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1;
> then
> ++ if ! command -v "@readelf@" >/dev/null 2>&1; then
> + _debug "readelf not found"
> + kernel_err="missing '${opt_arch_prefix}readelf' tool,
> please install it, usually it's in the 'binutils' package"
> + elif [ "$opt_sysfs_only" = 1 ] || [ "$opt_hw_only" = 1 ];
> then
> +@@ -2357,20 +2357,20 @@ else
> + # vanilla kernels have with ^Linux version
> + # also try harder with some kernels (such as Red Hat) that
> don't have ^Linux version before their version string
> + # and check for FreeBSD
> +- kernel_version=$("${opt_arch_prefix}strings" "$kernel"
> 2>/dev/null | grep -E \
> ++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -
> E \
> + -e '^Linux version ' \
> + -e '^[[:alnum:]][^[:space:]]+ \([^[:space:]]+\) #[0-
> 9]+ .+ (19|20)[0-9][0-9]$' \
> +- -e '^FreeBSD [0-9]' | head -1)
> ++ -e '^FreeBSD [0-9]' | @head@ -1)
> + if [ -z "$kernel_version" ]; then
> + # try even harder with some kernels (such as ARM)
> that split the release (uname -r) and version (uname -v) in 2
> adjacent strings
> +- kernel_version=$("${opt_arch_prefix}strings"
> "$kernel" 2>/dev/null | grep -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$'
> | tr "\n" " ")
> ++ kernel_version=$("@strings@" "$kernel" 2>/dev/null |
> @grep@ -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | @tr@ "\n" " ")
> + fi
> + if [ -n "$kernel_version" ]; then
> + # in live mode, check if the img we found is the
> correct one
> + if [ "$opt_live" = 1 ]; then
> + _verbose "Kernel image is
> \033[35m$kernel_version"
> +- if ! echo "$kernel_version" | grep -qF
> "$(uname -r)"; then
> +- _warn "Possible discrepancy between
> your running kernel '$(uname -r)' and the image '$kernel_version' we
> found ($opt_kernel), results might be incorrect"
> ++ if ! echo "$kernel_version" | @grep@ -qF
> "$(@uname@ -r)"; then
> ++ _warn "Possible discrepancy between
> your running kernel '$(@uname@ -r)' and the image '$kernel_version'
> we found ($opt_kernel), results might be incorrect"
> + fi
> + else
> + _info "Kernel image is
> \033[35m$kernel_version"
> +@@ -2398,11 +2398,11 @@ sys_interface_check()
> + if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" = 0 ] && [ -r
> "$file" ]; then
> + :
> + else
> +- mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(basename "$file")_RET=1")
> ++ mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(@basename@ "$file")_RET=1")
> + return 1
> + fi
> +
> +- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")_RET"
> ++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")_RET"
> + # shellcheck disable=SC2086,SC1083
> + if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
> + _debug "sysfs: MOCKING enabled for $file func returns
> $(eval echo \$$_mockvarname)"
> +@@ -2411,17 +2411,17 @@ sys_interface_check()
> + fi
> +
> + [ -n "$regex" ] || regex='.*'
> +- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")"
> ++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")"
> + # shellcheck disable=SC2086,SC1083
> + if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
> + fullmsg="$(eval echo \$$_mockvarname)"
> +- msg=$(echo "$fullmsg" | grep -Eo "$regex")
> ++ msg=$(echo "$fullmsg" | @grep@ -Eo "$regex")
> + _debug "sysfs: MOCKING enabled for $file, will return
> $fullmsg"
> + mocked=1
> + else
> +- fullmsg=$(cat "$file")
> +- msg=$(grep -Eo "$regex" "$file")
> +- mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(basename "$file")='$fullmsg'")
> ++ fullmsg=$(@cat@ "$file")
> ++ msg=$(@grep@ -Eo "$regex" "$file")
> ++ mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(@basename@ "$file")='$fullmsg'")
> + fi
> + if [ "$mode" = silent ]; then
> + return 0
> +@@ -2430,15 +2430,15 @@ sys_interface_check()
> + return 0
> + fi
> + _info_nol "* Mitigated according to the /sys interface: "
> +- if echo "$msg" | grep -qi '^not affected'; then
> ++ if echo "$msg" | @grep@ -qi '^not affected'; then
> + # Not affected
> + status=OK
> + pstatus green YES "$fullmsg"
> +- elif echo "$msg" | grep -qEi '^(kvm: )?mitigation'; then
> ++ elif echo "$msg" | @grep@ -qEi '^(kvm: )?mitigation'; then
> + # Mitigation: PTI
> + status=OK
> + pstatus green YES "$fullmsg"
> +- elif echo "$msg" | grep -qi '^vulnerable'; then
> ++ elif echo "$msg" | @grep@ -qi '^vulnerable'; then
> + # Vulnerable
> + status=VULN
> + pstatus yellow NO "$fullmsg"
> +@@ -2526,20 +2526,20 @@ write_msr_one_core()
> + # ret=4: msr doesn't exist, ret=127:
> msr.allow_writes=off
> + [ "$ret" = 127 ] && _write_denied=1
> + # or fallback to dd if it supports seek_bytes, we
> prefer it over perl because we can tell the difference between EPERM
> and EIO
> +- elif dd if=/dev/null of=/dev/null bs=8 count=1
> seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}"
> != 1 ]; then
> ++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1
> seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}"
> != 1 ]; then
> + _debug "write_msr: using dd"
> +- dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8
> count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
> ++ @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr
> bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
> + # if it failed, inspect stderrto look for
> EPERM
> + if [ "$ret" != 0 ]; then
> +- if dd if=/dev/zero
> of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec"
> oflag=seek_bytes 2>&1 | grep -qF 'Operation not permitted'; then
> ++ if @dd@ if=/dev/zero
> of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec"
> oflag=seek_bytes 2>&1 | @grep@ -qF 'Operation not permitted'; then
> + _write_denied=1
> + fi
> + fi
> + # or if we have perl, use it, any 5.x version will
> work
> +- elif command -v perl >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> ++ elif command -v @perl@ >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> + _debug "write_msr: using perl"
> + ret=1
> +- perl -e "open(M,'>','/dev/cpu/$_core/msr')
> and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -
> eq 8 ] && ret=0
> ++ @perl@ -e "open(M,'>','/dev/cpu/$_core/msr')
> and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -
> eq 8 ] && ret=0
> + else
> + _debug "write_msr: got no wrmsr, perl or
> recent enough dd!"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_ERR")
> +@@ -2561,13 +2561,13 @@ write_msr_one_core()
> + msr_locked_down=1
> + write_msr_msg="your kernel is
> configured to deny writes to MSRs from user space"
> + return $WRITE_MSR_RET_LOCKDOWN
> +- elif dmesg | grep -qF "msr: Direct access to
> MSR"; then
> ++ elif @dmesg@ | @grep@ -qF "msr: Direct access
> to MSR"; then
> + _debug "write_msr: locked down kernel
> detected (Red Hat / Fedora)"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
> + msr_locked_down=1
> + write_msr_msg="your kernel is locked
> down (Fedora/Red Hat), please reboot without secure boot and retry"
> + return $WRITE_MSR_RET_LOCKDOWN
> +- elif dmesg | grep -qF "raw MSR access is
> restricted"; then
> ++ elif @dmesg@ | @grep@ -qF "raw MSR access is
> restricted"; then
> + _debug "write_msr: locked down kernel
> detected (vanilla)"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
> + msr_locked_down=1
> +@@ -2666,8 +2666,8 @@ read_msr_one_core()
> + return $READ_MSR_RET_KO
> + fi
> + # MSR 0x10: 0x000003e1 0xb106dded
> +- _msr_h=$(echo "$_msr" | awk '{print $3}');
> +- _msr_l=$(echo "$_msr" | awk '{print $4}');
> ++ _msr_h=$(echo "$_msr" | @awk@ '{print $3}');
> ++ _msr_l=$(echo "$_msr" | @awk@ '{print $4}');
> + read_msr_value=$(( _msr_h << 32 | _msr_l ))
> + else
> + # for Linux
> +@@ -2678,15 +2678,15 @@ read_msr_one_core()
> + # if rdmsr is available, use it
> + elif command -v rdmsr >/dev/null 2>&1 && [
> "${SMC_NO_RDMSR:-}" != 1 ]; then
> + _debug "read_msr: using rdmsr on $_msr"
> +- read_msr_value=$(rdmsr -r $_msr_dec
> 2>/dev/null | od -t u8 -A n)
> ++ read_msr_value=$(rdmsr -r $_msr_dec
> 2>/dev/null | @od@ -t u8 -A n)
> + # or if we have perl, use it, any 5.x version will
> work
> +- elif command -v perl >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> ++ elif command -v @perl@ >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> + _debug "read_msr: using perl on $_msr"
> +- read_msr_value=$(perl -e
> "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and
> read(M,\$_,8) and print" | od -t u8 -A n)
> ++ read_msr_value=$(@perl@ -e
> "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and
> read(M,\$_,8) and print" | @od@ -t u8 -A n)
> + # fallback to dd if it supports skip_bytes
> +- elif dd if=/dev/null of=/dev/null bs=8 count=1
> skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
> ++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1
> skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
> + _debug "read_msr: using dd on $_msr"
> +- read_msr_value=$(dd if=/dev/cpu/"$_core"/msr
> bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | od -t u8
> -A n)
> ++ read_msr_value=$(@dd@
> if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec"
> iflag=skip_bytes 2>/dev/null | @od@ -t u8 -A n)
> + else
> + _debug "read_msr: got no rdmsr, perl or
> recent enough dd!"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_RDMSR_${_msr}_RET=$READ_MSR_RET_ERR")
> +@@ -2710,7 +2710,7 @@ check_cpu()
> + {
> + _info "\033[1;34mHardware check\033[0m"
> +
> +- if ! uname -m | grep -qwE 'x86_64|i[3-6]86|amd64'; then
> ++ if ! @uname@ -m | @grep@ -qwE 'x86_64|i[3-6]86|amd64'; then
> + return
> + fi
> +
> +@@ -3326,19 +3326,19 @@ check_redhat_canonical_spectre()
> + # if we were already called, don't do it again
> + [ -n "${redhat_canonical_spectre:-}" ] && return
> +
> +- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1;
> then
> ++ if ! command -v "@strings@" >/dev/null 2>&1; then
> + redhat_canonical_spectre=-1
> + elif [ -n "$kernel_err" ]; then
> + redhat_canonical_spectre=-2
> + else
> + # Red Hat / Ubuntu specific variant1 patch is
> difficult to detect,
> + # let's use the two same tricks than the official Red
> Hat detection script uses:
> +- if "${opt_arch_prefix}strings" "$kernel" | grep -qw
> noibrs && "${opt_arch_prefix}strings" "$kernel" | grep -qw noibpb;
> then
> ++ if "@strings@" "$kernel" | @grep@ -qw noibrs &&
> "@strings@" "$kernel" | @grep@ -qw noibpb; then
> + # 1) detect their specific variant2 patch. If
> it's present, it means
> + # that the variant1 patch is also present
> (both were merged at the same time)
> + _debug "found redhat/canonical version of the
> variant2 patch (implies variant1)"
> + redhat_canonical_spectre=1
> +- elif "${opt_arch_prefix}strings" "$kernel" | grep -q
> 'x86/pti:'; then
> ++ elif "@strings@" "$kernel" | @grep@ -q 'x86/pti:';
> then
> + # 2) detect their specific variant3 patch. If
> it's present, but the variant2
> + # is not, it means that only variant1 is
> present in addition to variant3
> + _debug "found redhat/canonical version of the
> variant3 patch (implies variant1 but not variant2)"
> +@@ -3363,13 +3363,13 @@ check_has_vmm()
> + # If we find no evidence that this is the case,
> assume we're not (to avoid scaring users),
> + # this can always be overridden with --vmm in any
> case.
> + has_vmm=0
> +- if command -v pgrep >/dev/null 2>&1; then
> ++ if command -v @pgrep@ >/dev/null 2>&1; then
> + # remove xenbus and xenwatch, also present
> inside domU
> + # remove libvirtd as it can also be used to
> manage containers and not VMs
> + # for each binary we want to grep, get the
> pids
> + for _binary in qemu kvm xenstored xenconsoled
> + do
> +- for _pid in $(pgrep -x $_binary)
> ++ for _pid in $(@pgrep@ -x $_binary)
> + do
> + # resolve the exe symlink, if
> it doesn't resolve with -m,
> + # which doesn't even need the
> dest to exist, it means the symlink
> +@@ -3385,7 +3385,7 @@ check_has_vmm()
> + else
> + # ignore SC2009 as `ps ax` is actually used
> as a fallback if `pgrep` isn't installed
> + # shellcheck disable=SC2009
> +- if command -v ps >/devnull && ps ax | grep -
> vw grep | grep -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e
> '/xenstored' -e '/xenconsoled'; then
> ++ if command -v ps >/devnull && ps ax | @grep@
> -vw grep | @grep@ -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e
> '/xenstored' -e '/xenconsoled'; then
> + has_vmm=1
> + fi
> + fi
> +@@ -3417,7 +3417,7 @@ check_CVE_2017_5753()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5753_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5753_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -3469,20 +3469,20 @@ check_CVE_2017_5753_linux()
> + v1_mask_nospec=''
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> + else
> +- perl -ne
> '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> ++ @perl@ -ne
> '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> + if [ $ret -gt 0 ]; then
> + pstatus green YES "$ret occurrence(s)
> found of x86 64 bits array_index_mask_nospec()"
> + v1_mask_nospec="x86 64 bits
> array_index_mask_nospec"
> + else
> +- perl -ne
> '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> ++ @perl@ -ne
> '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> + if [ $ret -gt 0 ]; then
> + pstatus green YES "$ret
> occurrence(s) found of x86 32 bits array_index_mask_nospec()"
> + v1_mask_nospec="x86 32 bits
> array_index_mask_nospec"
> + else
> +-
> ret=$("${opt_arch_prefix}objdum
> p" $objdump_options "$kernel" | grep -w -e f3af8014 -e e320f014 -B2 |
> grep -B1 -w sbc | grep -w -c cmp)
> ++ ret=$("@objdump@"
> $objdump_options "$kernel" | @grep@ -w -e f3af8014 -e e320f014 -B2 |
> @grep@ -B1 -w sbc | @grep@ -w -c cmp)
> + if [ "$ret" -gt 0 ]; then
> + pstatus green YES
> "$ret occurrence(s) found of arm 32 bits array_index_mask_nospec()"
> + v1_mask_nospec="arm
> 32 bits array_index_mask_nospec"
> +@@ -3526,12 +3526,12 @@ check_CVE_2017_5753_linux()
> + pstatus yellow NO
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> +- elif ! command -v "${opt_arch_prefix}objdump"
> >/dev/null 2>&1; then
> ++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}objdump' tool, please install it, usually it's in
> the binutils package"
> + else
> +- "${opt_arch_prefix}objdump" $objdump_options
> "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ &&
> $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ &&
> $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
> ++ "@objdump@" $objdump_options "$kernel" |
> @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/
> && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift
> @r if @r>3'; ret=$?
> + if [ "$ret" -eq 9 ]; then
> + pstatus green YES "mask_nospec64
> macro is present and used"
> + v1_mask_nospec="arm64 mask_nospec64"
> +@@ -3553,12 +3553,12 @@ check_CVE_2017_5753_linux()
> + pstatus yellow NO
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> +- elif ! command -v "${opt_arch_prefix}objdump"
> >/dev/null 2>&1; then
> ++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}objdump' tool, please install it, usually it's in
> the binutils package"
> + else
> +- "${opt_arch_prefix}objdump" -d "$kernel" |
> perl -ne 'push @r, $_; /\s(hint|csdb)\s/ &&
> $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ &&
> $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9);
> shift @r if @r>3'; ret=$?
> ++ "@objdump@" -d "$kernel" | @perl@ -ne 'push
> @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ &&
> $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9);
> shift @r if @r>3'; ret=$?
> + if [ "$ret" -eq 9 ]; then
> + pstatus green YES "array_index_nospec
> macro is present and used"
> + v1_mask_nospec="arm64
> array_index_nospec"
> +@@ -3574,7 +3574,7 @@ check_CVE_2017_5753_linux()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't
> check ($kernel_err)"
> + else
> +- if ! command -v
> "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
> ++ if ! command -v "@objdump@"
> >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN
> "missing '${opt_arch_prefix}objdump' tool, please install it, usually
> it's in the binutils package"
> + else
> + # here we disassemble the
> kernel and count the number of occurrences of the LFENCE opcode
> +@@ -3584,7 +3584,7 @@ check_CVE_2017_5753_linux()
> + # so let's push the threshold
> to 70.
> + # v0.33+: now only count
> lfence opcodes after a jump, way less error-prone
> + # non patched kernel have
> between 0 and 20 matches, patched ones have at least 40-45
> +-
> nb_lfence=$("${opt_arch_prefix}
> objdump" $objdump_options "$kernel" 2>/dev/null | grep -w -B1 lfence
> | grep -Ewc 'jmp|jne|je')
> ++ nb_lfence=$("@objdump@"
> $objdump_options "$kernel" 2>/dev/null | @grep@ -w -B1 lfence |
> @grep@ -Ewc 'jmp|jne|je')
> + if [ "$nb_lfence" -lt 30 ];
> then
> + pstatus yellow NO
> "only $nb_lfence jump-then-lfence instructions found, should be >= 30
> (heuristic)"
> + else
> +@@ -3655,7 +3655,7 @@ check_CVE_2017_5715()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5715_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5715_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -3697,13 +3697,13 @@ check_CVE_2017_5715_linux()
> + #
> /proc/sys/kernel/ibrs_enabled: OpenSUSE tumbleweed
> + specex_knob_dir=$dir
> + ibrs_supported="$dir/ibrs_ena
> bled exists"
> +- ibrs_enabled=$(cat
> "$dir/ibrs_enabled" 2>/dev/null)
> ++ ibrs_enabled=$(@cat@
> "$dir/ibrs_enabled" 2>/dev/null)
> + _debug "ibrs: found
> $dir/ibrs_enabled=$ibrs_enabled"
> + # if ibrs_enabled is there,
> ibpb_enabled will be in the same dir
> + if [ -e "$dir/ibpb_enabled"
> ]; then
> + # if the file is
> there, we have IBPB compiled-in (see note above for IBRS)
> + ibpb_supported="$dir/
> ibpb_enabled exists"
> +- ibpb_enabled=$(cat
> "$dir/ibpb_enabled" 2>/dev/null)
> ++ ibpb_enabled=$(@cat@
> "$dir/ibpb_enabled" 2>/dev/null)
> + _debug "ibpb: found
> $dir/ibpb_enabled=$ibpb_enabled"
> + else
> + _debug "ibpb:
> $dir/ibpb_enabled file doesn't exist"
> +@@ -3718,7 +3718,7 @@ check_CVE_2017_5715_linux()
> + # which in that case means ibrs is supported
> *and* enabled for kernel & user
> + # as per the ibrs patch series v3
> + if [ -z "$ibrs_supported" ]; then
> +- if grep ^flags "$procfs/cpuinfo" |
> grep -qw spec_ctrl_ibrs; then
> ++ if @grep@ ^flags "$procfs/cpuinfo" |
> @grep@ -qw spec_ctrl_ibrs; then
> + _debug "ibrs: found
> spec_ctrl_ibrs flag in $procfs/cpuinfo"
> + ibrs_supported="spec_ctrl_ibr
> s flag in $procfs/cpuinfo"
> + # enabled=2 -> kernel & user
> +@@ -3728,13 +3728,13 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -n "$fullmsg" ]; then
> + # when IBPB is enabled on 4.15+, we
> can see it in sysfs
> +- if echo "$fullmsg" | grep -q 'IBPB';
> then
> ++ if echo "$fullmsg" | @grep@ -q
> 'IBPB'; then
> + _debug "ibpb: found enabled
> in sysfs"
> + [ -z "$ibpb_supported" ] &&
> ibpb_supported='IBPB found enabled in sysfs'
> + [ -z "$ibpb_enabled" ] &&
> ibpb_enabled=1
> + fi
> + # when IBRS_FW is enabled on 4.15+,
> we can see it in sysfs
> +- if echo "$fullmsg" | grep -q ',
> IBRS_FW'; then
> ++ if echo "$fullmsg" | @grep@ -q ',
> IBRS_FW'; then
> + _debug "ibrs: found IBRS_FW
> in sysfs"
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found IBRS_FW in sysfs'
> + ibrs_fw_enabled=1
> +@@ -3742,13 +3742,13 @@ check_CVE_2017_5715_linux()
> + # when IBRS is enabled on 4.15+, we
> can see it in sysfs
> + # on a more recent kernel, classic
> "IBRS" is not even longer an option, because of the performance
> impact.
> + # only "Enhanced IBRS" is available
> (on CPUs with the IBRS_ALL flag)
> +- if echo "$fullmsg" | grep -q -e
> '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
> ++ if echo "$fullmsg" | @grep@ -q -e
> '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
> + _debug "ibrs: found IBRS in
> sysfs"
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found IBRS in sysfs'
> + [ -z "$ibrs_enabled" ] &&
> ibrs_enabled=3
> + fi
> + # checking for 'Enhanced IBRS' in
> sysfs, enabled on CPUs with IBRS_ALL
> +- if echo "$fullmsg" | grep -q -e
> 'Enhanced IBRS'; then
> ++ if echo "$fullmsg" | @grep@ -q -e
> 'Enhanced IBRS'; then
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found Enhanced IBRS in sysfs'
> + # 4 isn't actually a valid
> value of the now extinct "ibrs_enabled" flag file,
> + # that only went from 0 to 3,
> so we use 4 as "enhanced ibrs is enabled"
> +@@ -3767,11 +3767,11 @@ check_CVE_2017_5715_linux()
> + fi
> + fi
> + if [ -z "$ibrs_supported" ] && [ -n "$kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + :
> + else
> + ibrs_can_tell=1
> +-
> ibrs_supported=$("${opt_arch_prefix}str
> ings" "$kernel" | grep -Fw -e ', IBRS_FW' | head -1)
> ++ ibrs_supported=$("@strings@"
> "$kernel" | @grep@ -Fw -e ', IBRS_FW' | @head@ -1)
> + if [ -n "$ibrs_supported" ]; then
> + _debug "ibrs: found ibrs
> evidence in kernel image ($ibrs_supported)"
> + ibrs_supported="found
> '$ibrs_supported' in kernel image"
> +@@ -3780,7 +3780,7 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -z "$ibrs_supported" ] && [ -n "$opt_map" ];
> then
> + ibrs_can_tell=1
> +- if grep -q spec_ctrl "$opt_map"; then
> ++ if @grep@ -q spec_ctrl "$opt_map"; then
> + ibrs_supported="found spec_ctrl in
> symbols file"
> + _debug "ibrs: found '*spec_ctrl*'
> symbol in $opt_map"
> + fi
> +@@ -3788,11 +3788,11 @@ check_CVE_2017_5715_linux()
> + # recent (4.15) vanilla kernels have IBPB but not
> IBRS, and without the debugfs tunables of Red Hat
> + # we can detect it directly in the image
> + if [ -z "$ibpb_supported" ] && [ -n "$kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + :
> + else
> + ibpb_can_tell=1
> +-
> ibpb_supported=$("${opt_arch_prefix}str
> ings" "$kernel" | grep -Fw -e 'ibpb' -e ', IBPB' | head -1)
> ++ ibpb_supported=$("@strings@"
> "$kernel" | @grep@ -Fw -e 'ibpb' -e ', IBPB' | @head@ -1)
> + if [ -n "$ibpb_supported" ]; then
> + _debug "ibpb: found ibpb
> evidence in kernel image ($ibpb_supported)"
> + ibpb_supported="found
> '$ibpb_supported' in kernel image"
> +@@ -3841,9 +3841,9 @@ check_CVE_2017_5715_linux()
> + 2) if [
> "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel, user
> space, and firmware code" ; else pstatus green YES "for both kernel
> and user space"; fi;;
> + 3) if [
> "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel and
> firmware code"; else pstatus green YES; fi;;
> + 4) pstatus green YES
> "Enhanced flavor, performance impact will be greatly reduced";;
> +- *) if [ "$cpuid_ibrs" !=
> 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [
> "$cpuid_spec_ctrl" != -1 ];
> +- then pstatus
> yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
> +- else
> ++ *) if [ "$cpuid_ibrs" !=
> 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [
> "$cpuid_spec_ctrl" != -1 ];
> ++ then pstatus
> yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
> ++ else
> + pstatus
> yellow UNKNOWN; fi;;
> + esac
> + fi
> +@@ -3894,7 +3894,7 @@ check_CVE_2017_5715_linux()
> + bp_harden=''
> + if [ -r "$opt_config" ]; then
> + bp_harden_can_tell=1
> +- bp_harden=$(grep -w
> 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
> ++ bp_harden=$(@grep@ -w
> 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
> + if [ -n "$bp_harden" ]; then
> + pstatus green YES
> + _debug "bp_harden: found '$bp_harden'
> in $opt_config"
> +@@ -3902,7 +3902,7 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -z "$bp_harden" ] && [ -n "$opt_map" ]; then
> + bp_harden_can_tell=1
> +- bp_harden=$(grep -w bp_hardening_data
> "$opt_map")
> ++ bp_harden=$(@grep@ -w bp_hardening_data
> "$opt_map")
> + if [ -n "$bp_harden" ]; then
> + pstatus green YES
> + _debug "bp_harden: found '$bp_harden'
> in $opt_map"
> +@@ -3920,11 +3920,11 @@ check_CVE_2017_5715_linux()
> + # We check the RETPOLINE kernel options
> + retpoline=0
> + if [ -r "$opt_config" ]; then
> +- if grep -q '^CONFIG_RETPOLINE=y'
> "$opt_config"; then
> ++ if @grep@ -q '^CONFIG_RETPOLINE=y'
> "$opt_config"; then
> + pstatus green YES
> + retpoline=1
> + # shellcheck disable=SC2046
> +- _debug 'retpoline: found '$(grep
> '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
> ++ _debug 'retpoline: found '$(@grep@
> '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
> + else
> + pstatus yellow NO
> + fi
> +@@ -3945,8 +3945,8 @@ check_CVE_2017_5715_linux()
> + # since 5.15.28, this is now "Retpolines" as
> the implementation was switched to a generic one,
> + # so we look for both "retpoline" and
> "retpolines"
> + if [ "$opt_live" = 1 ] && [ -n "$fullmsg" ];
> then
> +- if echo "$fullmsg" | grep -qwi -e
> retpoline -e retpolines; then
> +- if echo "$fullmsg" | grep -
> qwi minimal; then
> ++ if echo "$fullmsg" | @grep@ -qwi -e
> retpoline -e retpolines; then
> ++ if echo "$fullmsg" | @grep@ -
> qwi minimal; then
> + retpoline_compiler=0
> + retpoline_compiler_re
> ason="kernel reports minimal retpoline compilation"
> + else
> +@@ -3956,19 +3956,19 @@ check_CVE_2017_5715_linux()
> + fi
> + elif [ -n "$opt_map" ]; then
> + # look for the symbol
> +- if grep -qw noretpoline_setup
> "$opt_map"; then
> ++ if @grep@ -qw noretpoline_setup
> "$opt_map"; then
> + retpoline_compiler=1
> + retpoline_compiler_reason="no
> retpoline_setup symbol found in System.map"
> + fi
> + elif [ -n "$kernel" ]; then
> + # look for the symbol
> +- if command -v "${opt_arch_prefix}nm"
> >/dev/null 2>&1; then
> ++ if command -v "@nm@" >/dev/null 2>&1;
> then
> + # the proper way: use nm and
> look for the symbol
> +- if "${opt_arch_prefix}nm"
> "$kernel" 2>/dev/null | grep -qw 'noretpoline_setup'; then
> ++ if "@nm@" "$kernel"
> 2>/dev/null | @grep@ -qw 'noretpoline_setup'; then
> + retpoline_compiler=1
> + retpoline_compiler_re
> ason="noretpoline_setup found in kernel symbols"
> + fi
> +- elif grep -q noretpoline_setup
> "$kernel"; then
> ++ elif @grep@ -q noretpoline_setup
> "$kernel"; then
> + # if we don't have nm,
> nevermind, the symbol name is long enough to not have
> + # any false positive using
> good old grep directly on the binary
> + retpoline_compiler=1
> +@@ -3997,7 +3997,7 @@ check_CVE_2017_5715_linux()
> + retp_enabled=-1
> + if [ "$opt_live" = 1 ]; then
> + if [ -e "$specex_knob_dir/retp_enabled" ];
> then
> +- retp_enabled=$(cat
> "$specex_knob_dir/retp_enabled" 2>/dev/null)
> ++ retp_enabled=$(@cat@
> "$specex_knob_dir/retp_enabled" 2>/dev/null)
> + _debug "retpoline: found
> $specex_knob_dir/retp_enabled=$retp_enabled"
> + _info_nol " * Retpoline is
> enabled: "
> + if [ "$retp_enabled" = 1 ]; then
> +@@ -4027,7 +4027,7 @@ check_CVE_2017_5715_linux()
> + rsb_filling=0
> + if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs"
> != 1 ]; then
> + # if we're live and we aren't denied
> looking into /sys, let's do it
> +- if echo "$msg" | grep -qw RSB; then
> ++ if echo "$msg" | @grep@ -qw RSB; then
> + rsb_filling=1
> + pstatus green YES
> + fi
> +@@ -4036,7 +4036,7 @@ check_CVE_2017_5715_linux()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN
> "couldn't check ($kernel_err)"
> + else
> +- if grep -qw -e 'Filling RSB
> on context switch' "$kernel"; then
> ++ if @grep@ -qw -e 'Filling RSB
> on context switch' "$kernel"; then
> + rsb_filling=1
> + pstatus green YES
> + else
> +@@ -4198,7 +4198,7 @@ check_CVE_2017_5715_bsd()
> + {
> + _info "* Mitigation 1"
> + _info_nol " * Kernel supports IBRS: "
> +- ibrs_disabled=$(sysctl -n hw.ibrs_disable 2>/dev/null)
> ++ ibrs_disabled=$(@sysctl@ -n hw.ibrs_disable 2>/dev/null)
> + if [ -z "$ibrs_disabled" ]; then
> + pstatus yellow NO
> + else
> +@@ -4206,7 +4206,7 @@ check_CVE_2017_5715_bsd()
> + fi
> +
> + _info_nol " * IBRS enabled and active: "
> +- ibrs_active=$(sysctl -n hw.ibrs_active 2>/dev/null)
> ++ ibrs_active=$(@sysctl@ -n hw.ibrs_active 2>/dev/null)
> + if [ "$ibrs_active" = 1 ]; then
> + pstatus green YES
> + else
> +@@ -4219,10 +4219,10 @@ check_CVE_2017_5715_bsd()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
> + else
> +- if ! command -v "${opt_arch_prefix}readelf"
> >/dev/null 2>&1; then
> ++ if ! command -v "@readelf@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}readelf' tool, please install it, usually it's in
> the binutils package"
> + else
> +- nb_thunks=$("${opt_arch_prefix}readelf" -s
> "$kernel" | grep -c -e __llvm_retpoline_ -e
> __llvm_external_retpoline_ -e __x86_indirect_thunk_)
> ++ nb_thunks=$("@readelf@" -s "$kernel" | @grep@
> -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e
> __x86_indirect_thunk_)
> + if [ "$nb_thunks" -gt 0 ]; then
> + retpoline=1
> + pstatus green YES "found $nb_thunks
> thunk(s)"
> +@@ -4263,7 +4263,7 @@ check_CVE_2017_5715_bsd()
> + pti_performance_check()
> + {
> + _info_nol " * Reduced performance impact of PTI: "
> +- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo"
> | grep -qw pcid; then
> ++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw pcid; then
> + cpu_pcid=1
> + else
> + read_cpuid 0x1 0x0 $ECX 17 1 1; ret=$?
> +@@ -4272,7 +4272,7 @@ pti_performance_check()
> + fi
> + fi
> +
> +- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo"
> | grep -qw invpcid; then
> ++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw invpcid; then
> + cpu_invpcid=1
> + else
> + read_cpuid 0x7 0x0 $EBX 10 1 1; ret=$?
> +@@ -4297,7 +4297,7 @@ check_CVE_2017_5754()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5754_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5754_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4319,7 +4319,7 @@ check_CVE_2017_5754_linux()
> + kpti_can_tell=0
> + if [ -n "$opt_config" ]; then
> + kpti_can_tell=1
> +- kpti_support=$(grep -w -e
> CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e
> CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
> ++ kpti_support=$(@grep@ -w -e
> CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e
> CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found option
> '$kpti_support' in $opt_config"
> + fi
> +@@ -4329,7 +4329,7 @@ check_CVE_2017_5754_linux()
> + # so we try to find an exported symbol that
> is part of the PTI patch in System.map
> + # parse_kpti: arm
> + kpti_can_tell=1
> +- kpti_support=$(grep -w -e kpti_force_enabled
> -e parse_kpti "$opt_map")
> ++ kpti_support=$(@grep@ -w -e
> kpti_force_enabled -e parse_kpti "$opt_map")
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found
> '$kpti_support' in $opt_map"
> + fi
> +@@ -4339,10 +4339,10 @@ check_CVE_2017_5754_linux()
> + # nopti option that is part of the patch
> (kernel command line option)
> + # 'kpti=': arm
> + kpti_can_tell=1
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}strings' tool, please install it, usually it's in
> the binutils package"
> + else
> +-
> kpti_support=$("${opt_arch_prefix}strin
> gs" "$kernel" | grep -w -e nopti -e kpti=)
> ++ kpti_support=$("@strings@" "$kernel"
> | @grep@ -w -e nopti -e kpti=)
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found
> '$kpti_support' in $kernel"
> + fi
> +@@ -4369,20 +4369,20 @@ check_CVE_2017_5754_linux()
> + dmesg_grep="$dmesg_grep|x86/pti: Unmapping
> kernel while in userspace"
> + # aarch64
> + dmesg_grep="$dmesg_grep|CPU features:
> detected( feature)?: Kernel page table isolation \(KPTI\)"
> +- if grep ^flags "$procfs/cpuinfo" | grep -qw
> pti; then
> ++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -
> qw pti; then
> + # vanilla PTI patch sets the 'pti'
> flag in cpuinfo
> + _debug "kpti_enabled: found 'pti'
> flag in $procfs/cpuinfo"
> + kpti_enabled=1
> +- elif grep ^flags "$procfs/cpuinfo" | grep -qw
> kaiser; then
> ++ elif @grep@ ^flags "$procfs/cpuinfo" | @grep@
> -qw kaiser; then
> + # kernel line 4.9 sets the 'kaiser'
> flag in cpuinfo
> + _debug "kpti_enabled: found 'kaiser'
> flag in $procfs/cpuinfo"
> + kpti_enabled=1
> + elif [ -e /sys/kernel/debug/x86/pti_enabled
> ]; then
> + # Red Hat Backport creates a
> dedicated file, see https://access.redhat.com/articles/3311301
> +- kpti_enabled=$(cat
> /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
> ++ kpti_enabled=$(@cat@
> /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
> + _debug "kpti_enabled: file
> /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
> + elif is_xen_dom0; then
> +- pti_xen_pv_domU=$(xl dmesg | grep
> 'XPTI' | grep 'DomU enabled' | head -1)
> ++ pti_xen_pv_domU=$(xl @dmesg@ | @grep@
> 'XPTI' | @grep@ 'DomU enabled' | @head@ -1)
> +
> + [ -n "$pti_xen_pv_domU" ] &&
> kpti_enabled=1
> + fi
> +@@ -4457,7 +4457,7 @@ check_CVE_2017_5754_linux()
> + if [ -n "$kpti_support" ]; then
> + if [ -e
> "/sys/kernel/debug/x86/pti_enabled" ]; then
> + explain "Your kernel
> supports PTI but it's disabled, you can enable it with \`echo 1 >
> /sys/kernel/debug/x86/pti_enabled\`"
> +- elif echo "$kernel_cmdline" |
> grep -q -w -e nopti -e pti=off; then
> ++ elif echo "$kernel_cmdline" |
> @grep@ -q -w -e nopti -e pti=off; then
> + explain "Your kernel
> supports PTI but it has been disabled on command-line, remove the
> nopti or pti=off option from your bootloader configuration"
> + else
> + explain "Your kernel
> supports PTI but it has been disabled, check \`dmesg\` right after
> boot to find clues why the system disabled it"
> +@@ -4508,7 +4508,7 @@ check_CVE_2017_5754_linux()
> + check_CVE_2017_5754_bsd()
> + {
> + _info_nol "* Kernel supports Page Table Isolation (PTI): "
> +- kpti_enabled=$(sysctl -n vm.pmap.pti 2>/dev/null)
> ++ kpti_enabled=$(@sysctl@ -n vm.pmap.pti 2>/dev/null)
> + if [ -z "$kpti_enabled" ]; then
> + pstatus yellow NO
> + else
> +@@ -4579,7 +4579,7 @@ check_CVE_2018_3639()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3639_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3639_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4598,33 +4598,33 @@ check_CVE_2018_3639_linux()
> + if [ "$opt_sysfs_only" != 1 ]; then
> + _info_nol "* Kernel supports disabling speculative
> store bypass (SSB): "
> + if [ "$opt_live" = 1 ]; then
> +- if grep -Eq 'Speculation.?Store.?Bypass:'
> "$procfs/self/status" 2>/dev/null; then
> ++ if @grep@ -Eq 'Speculation.?Store.?Bypass:'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssb="found in
> $procfs/self/status"
> + _debug "found
> Speculation.Store.Bypass: in $procfs/self/status"
> + fi
> + fi
> + # arm64 kernels can have cpu_show_spec_store_bypass
> with ARM64_SSBD, so exclude them
> +- if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! grep
> -q 'arm64_sys_' "$kernel"; then
> +- kernel_ssb=$("${opt_arch_prefix}strings"
> "$kernel" | grep spec_store_bypass | head -n1);
> ++ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && !
> @grep@ -q 'arm64_sys_' "$kernel"; then
> ++ kernel_ssb=$("@strings@" "$kernel" | @grep@
> spec_store_bypass | @head@ -n1);
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in kernel"
> + fi
> + # arm64 kernels can have cpu_show_spec_store_bypass
> with ARM64_SSBD, so exclude them
> +- if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && !
> grep -q 'arm64_sys_' "$opt_map"; then
> +- kernel_ssb=$(grep spec_store_bypass
> "$opt_map" | awk '{print $3}' | head -n1)
> ++ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && !
> @grep@ -q 'arm64_sys_' "$opt_map"; then
> ++ kernel_ssb=$(@grep@ spec_store_bypass
> "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in System.map"
> + fi
> + # arm64 only:
> + if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ]; then
> +- kernel_ssb=$(grep -w cpu_enable_ssbs
> "$opt_map" | awk '{print $3}' | head -n1)
> ++ kernel_ssb=$(@grep@ -w cpu_enable_ssbs
> "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in System.map"
> + fi
> + if [ -z "$kernel_ssb" ] && [ -n "$opt_config" ]; then
> +- kernel_ssb=$(grep -w 'CONFIG_ARM64_SSBD=y'
> "$opt_config")
> ++ kernel_ssb=$(@grep@ -w 'CONFIG_ARM64_SSBD=y'
> "$opt_config")
> + [ -n "$kernel_ssb" ] &&
> kernel_ssb="CONFIG_ARM64_SSBD enabled in kconfig"
> + fi
> + if [ -z "$kernel_ssb" ] && [ -n "$kernel" ]; then
> + # this string only appears in kernel if
> CONFIG_ARM64_SSBD is set
> +- kernel_ssb=$(grep -w "Speculative Store
> Bypassing Safe (SSBS)" "$kernel")
> ++ kernel_ssb=$(@grep@ -w "Speculative Store
> Bypassing Safe (SSBS)" "$kernel")
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> 'Speculative Store Bypassing Safe (SSBS)' in kernel"
> + fi
> + # /arm64 only
> +@@ -4639,31 +4639,31 @@ check_CVE_2018_3639_linux()
> + if [ "$opt_live" = 1 ]; then
> + #
> https://elixir.bootlin.com/linux/v5.0/source/fs/proc/array.c#L340
> + _info_nol "* SSB mitigation is enabled and
> active: "
> +- if grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status"
> 2>/dev/null; then
> ++ if @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status"
> 2>/dev/null; then
> + kernel_ssbd_enabled=1
> + pstatus green YES "per-thread through
> prctl"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=2
> + pstatus green YES "global"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=0
> + pstatus yellow NO
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=-2
> + pstatus blue NO "not vulnerable"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+unknown'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+unknown'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=0
> + pstatus blue NO
> + else
> +- pstatus blue UNKNOWN "unknown value:
> $(grep -E 'Speculation.?Store.?Bypass:' "$procfs/self/status"
> 2>/dev/null | cut -d: -f2-)"
> ++ pstatus blue UNKNOWN "unknown value:
> $(@grep@ -E 'Speculation.?Store.?Bypass:' "$procfs/self/status"
> 2>/dev/null | @cut@ -d: -f2-)"
> + fi
> +
> + if [ "$kernel_ssbd_enabled" = 1 ]; then
> + _info_nol "* SSB mitigation currently
> active for selected processes: "
> + # silence grep's stderr here to avoid
> ENOENT errors from processes that have exited since the shell's
> expansion of the *
> +- mitigated_processes=$(find /proc -
> mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
> +- | xargs -r0 grep -El
> 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated'
> 2>/dev/null \
> +- | sed s/status/exe/ | xargs -
> r -n1 readlink -f 2>/dev/null | xargs -r -n1 basename | sort -u | tr
> "\n" " " | sed 's/ $//')
> ++ mitigated_processes=$(@find@ /proc -
> mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
> ++ | @xargs@ -r0 @grep@ -El
> 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated'
> 2>/dev/null \
> ++ | @sed@ s/status/exe/ |
> @xargs@ -r -n1 readlink -f 2>/dev/null | @xargs@ -r -n1 @basename@ |
> @sort@ -u | @tr@ "\n" " " | @sed@ 's/ $//')
> + if [ -n "$mitigated_processes" ];
> then
> + pstatus green YES
> "$mitigated_processes"
> + else
> +@@ -4715,7 +4715,7 @@ check_CVE_2018_3639_linux()
> + check_CVE_2018_3639_bsd()
> + {
> + _info_nol "* Kernel supports speculation store bypass: "
> +- if sysctl hw.spec_store_bypass_disable >/dev/null 2>&1; then
> ++ if @sysctl@ hw.spec_store_bypass_disable >/dev/null 2>&1;
> then
> + kernel_ssb=1
> + pstatus green YES
> + else
> +@@ -4724,7 +4724,7 @@ check_CVE_2018_3639_bsd()
> + fi
> +
> + _info_nol "* Speculation store bypass is administratively
> enabled: "
> +- ssb_enabled=$(sysctl -n hw.spec_store_bypass_disable
> 2>/dev/null)
> ++ ssb_enabled=$(@sysctl@ -n hw.spec_store_bypass_disable
> 2>/dev/null)
> + _debug "hw.spec_store_bypass_disable=$ssb_enabled"
> + case "$ssb_enabled" in
> + 0) pstatus yellow NO "disabled";;
> +@@ -4734,7 +4734,7 @@ check_CVE_2018_3639_bsd()
> + esac
> +
> + _info_nol "* Speculation store bypass is currently active: "
> +- ssb_active=$(sysctl -n hw.spec_store_bypass_disable_active
> 2>/dev/null)
> ++ ssb_active=$(@sysctl@ -n hw.spec_store_bypass_disable_active
> 2>/dev/null)
> + _debug "hw.spec_store_bypass_disable_active=$ssb_active"
> + case "$ssb_active" in
> + 1) pstatus green YES;;
> +@@ -4806,7 +4806,7 @@ check_CVE_2018_3620()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3620_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3620_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4824,14 +4824,14 @@ check_CVE_2018_3620_linux()
> + fi
> + if [ "$opt_sysfs_only" != 1 ]; then
> + _info_nol "* Kernel supports PTE inversion: "
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'strings'
> tool, please install it"
> + pteinv_supported=-1
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "$kernel_err"
> + pteinv_supported=-1
> + else
> +- if "${opt_arch_prefix}strings" "$kernel" |
> grep -Fq 'PTE Inversion'; then
> ++ if "@strings@" "$kernel" | @grep@ -Fq 'PTE
> Inversion'; then
> + pstatus green YES "found in kernel
> image"
> + _debug "pteinv: found pte inversion
> evidence in kernel image"
> + pteinv_supported=1
> +@@ -4844,7 +4844,7 @@ check_CVE_2018_3620_linux()
> + _info_nol "* PTE inversion enabled and active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -q
> 'Mitigation: PTE Inversion'; then
> ++ if echo "$fullmsg" | @grep@ -q
> 'Mitigation: PTE Inversion'; then
> + pstatus green YES
> + pteinv_active=1
> + else
> +@@ -4892,7 +4892,7 @@ check_CVE_2018_3620_bsd()
> + else
> + _debug "vmm module already loaded"
> + fi
> +- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> ++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> + #
> https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
> + # this is very difficult to detect that the kernel
> reserved the 0 page, but this fix
> + # is part of the exact same patch than the other L1TF
> CVE, so we detect it
> +@@ -4922,7 +4922,7 @@ check_CVE_2018_3646()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3646_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3646_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4948,7 +4948,7 @@ check_CVE_2018_3646_linux()
> + if [ "$opt_live" = 1 ]; then
> + if ! [ -r
> /sys/module/kvm_intel/parameters/ept ]; then
> + pstatus blue N/A "the kvm_intel
> module is not loaded"
> +- elif [ "$(cat
> /sys/module/kvm_intel/parameters/ept)" = N ]; then
> ++ elif [ "$(@cat@
> /sys/module/kvm_intel/parameters/ept)" = N ]; then
> + pstatus green YES
> + ept_disabled=1
> + else
> +@@ -4960,15 +4960,15 @@ check_CVE_2018_3646_linux()
> +
> + _info "* Mitigation 2"
> + _info_nol " * L1D flush is supported by kernel: "
> +- if [ "$opt_live" = 1 ] && grep -qw flush_l1d
> "$procfs/cpuinfo"; then
> ++ if [ "$opt_live" = 1 ] && @grep@ -qw flush_l1d
> "$procfs/cpuinfo"; then
> + l1d_kernel="found flush_l1d in
> $procfs/cpuinfo"
> + fi
> + if [ -z "$l1d_kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + l1d_kernel_err="missing
> '${opt_arch_prefix}strings' tool, please install it, usually it's in
> the binutils package"
> + elif [ -n "$kernel_err" ]; then
> + l1d_kernel_err="$kernel_err"
> +- elif "${opt_arch_prefix}strings" "$kernel" |
> grep -qw flush_l1d; then
> ++ elif "@strings@" "$kernel" | @grep@ -qw
> flush_l1d; then
> + l1d_kernel='found flush_l1d in kernel
> image'
> + fi
> + fi
> +@@ -4989,20 +4989,20 @@ check_CVE_2018_3646_linux()
> + # $l1dstatus is one of
> (auto|vulnerable|conditional cache flushes|cache flushes|EPT
> disabled|flush not necessary)
> + # $smtstatus is one of
> (vulnerable|disabled)
> + # can also just be "Not affected"
> +- if echo "$fullmsg" | grep -Eq -e 'Not
> affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not
> necessary)'; then
> ++ if echo "$fullmsg" | @grep@ -Eq -e
> 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not
> necessary)'; then
> + l1d_mode=0
> + pstatus yellow NO
> +- elif echo "$fullmsg" | grep -Eq
> '(VMX:|L1D) conditional cache flushes'; then
> ++ elif echo "$fullmsg" | @grep@ -Eq
> '(VMX:|L1D) conditional cache flushes'; then
> + l1d_mode=1
> + pstatus green YES
> "conditional flushes"
> +- elif echo "$fullmsg" | grep -Eq
> '(VMX:|L1D) cache flushes'; then
> ++ elif echo "$fullmsg" | @grep@ -Eq
> '(VMX:|L1D) cache flushes'; then
> + l1d_mode=2
> + pstatus green YES
> "unconditional flushes"
> + else
> + if is_xen_dom0; then
> +- l1d_xen_hardware=$(xl
> dmesg | grep 'Hardware features:' | grep 'L1D_FLUSH' | head -1)
> +-
> l1d_xen_hypervisor=$(xl
> dmesg | grep 'Xen settings:' | grep 'L1D_FLUSH' | head -1)
> +- l1d_xen_pv_domU=$(xl
> dmesg | grep 'PV L1TF shadowing:' | grep 'DomU enabled' | head -1)
> ++ l1d_xen_hardware=$(xl
> @dmesg@ | @grep@ 'Hardware features:' | @grep@ 'L1D_FLUSH' | @head@ -
> 1)
> ++ l1d_xen_hypervisor=$(
> xl @dmesg@ | @grep@ 'Xen settings:' | @grep@ 'L1D_FLUSH' | @head@ -1)
> ++ l1d_xen_pv_domU=$(xl
> @dmesg@ | @grep@ 'PV L1TF shadowing:' | @grep@ 'DomU enabled' |
> @head@ -1)
> +
> + if [ -n
> "$l1d_xen_hardware" ] && [ -n "$l1d_xen_hypervisor" ] && [ -n
> "$l1d_xen_pv_domU" ]; then
> + l1d_mode=5
> +@@ -5033,7 +5033,7 @@ check_CVE_2018_3646_linux()
> +
> + _info_nol " * Hardware-backed L1D flush supported: "
> + if [ "$opt_live" = 1 ]; then
> +- if grep -qw flush_l1d "$procfs/cpuinfo" || [
> -n "$l1d_xen_hardware" ]; then
> ++ if @grep@ -qw flush_l1d "$procfs/cpuinfo" ||
> [ -n "$l1d_xen_hardware" ]; then
> + pstatus green YES "performance impact
> of the mitigation will be greatly reduced"
> + else
> + pstatus blue NO "flush will be done
> in software, this is slower"
> +@@ -5105,7 +5105,7 @@ check_CVE_2018_3646_linux()
> + check_CVE_2018_3646_bsd()
> + {
> + _info_nol "* Kernel supports L1D flushing: "
> +- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> ++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> + pstatus green YES
> + kernel_l1d_supported=1
> + else
> +@@ -5114,7 +5114,7 @@ check_CVE_2018_3646_bsd()
> + fi
> +
> + _info_nol "* L1D flushing is enabled: "
> +- kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush
> 2>/dev/null)
> ++ kernel_l1d_enabled=$(@sysctl@ -n hw.vmm.vmx.l1d_flush
> 2>/dev/null)
> + case "$kernel_l1d_enabled" in
> + 0) pstatus yellow NO;;
> + 1) pstatus green YES;;
> +@@ -5168,7 +5168,7 @@ check_CVE_2018_12127()
> + ###################
> + # MDSUM SECTION
> +
> +-# Microarchitectural Data Sampling Uncacheable Memory
> ++# Microarchitectural Data Sampling Uncacheable Memory
> + check_CVE_2019_11091()
> + {
> + cve='CVE-2019-11091'
> +@@ -5182,7 +5182,7 @@ check_mds()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_mds_linux "$cve"
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_mds_bsd "$cve"
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5193,7 +5193,7 @@ check_mds_bsd()
> + {
> + _info_nol "* Kernel supports using MD_CLEAR mitigation: "
> + if [ "$opt_live" = 1 ]; then
> +- if sysctl hw.mds_disable >/dev/null 2>&1; then
> ++ if @sysctl@ hw.mds_disable >/dev/null 2>&1; then
> + pstatus green YES
> + kernel_md_clear=1
> + else
> +@@ -5201,7 +5201,7 @@ check_mds_bsd()
> + kernel_md_clear=0
> + fi
> + else
> +- if grep -Fq hw.mds_disable $opt_kernel; then
> ++ if @grep@ -Fq hw.mds_disable $opt_kernel; then
> + pstatus green YES
> + kernel_md_clear=1
> + else
> +@@ -5211,8 +5211,8 @@ check_mds_bsd()
> + fi
> +
> + _info_nol "* CPU Hyper-Threading (SMT) is disabled: "
> +- if sysctl machdep.hyperthreading_allowed >/dev/null 2>&1;
> then
> +- kernel_smt_allowed=$(sysctl -n
> machdep.hyperthreading_allowed 2>/dev/null)
> ++ if @sysctl@ machdep.hyperthreading_allowed >/dev/null 2>&1;
> then
> ++ kernel_smt_allowed=$(@sysctl@ -n
> machdep.hyperthreading_allowed 2>/dev/null)
> + if [ "$kernel_smt_allowed" = 1 ]; then
> + pstatus yellow NO
> + else
> +@@ -5224,7 +5224,7 @@ check_mds_bsd()
> +
> + _info_nol "* Kernel mitigation is enabled: "
> + if [ "$kernel_md_clear" = 1 ]; then
> +- kernel_mds_enabled=$(sysctl -n hw.mds_disable
> 2>/dev/null)
> ++ kernel_mds_enabled=$(@sysctl@ -n hw.mds_disable
> 2>/dev/null)
> + else
> + kernel_mds_enabled=0
> + fi
> +@@ -5238,7 +5238,7 @@ check_mds_bsd()
> +
> + _info_nol "* Kernel mitigation is active: "
> + if [ "$kernel_md_clear" = 1 ]; then
> +- kernel_mds_state=$(sysctl -n hw.mds_disable_state
> 2>/dev/null)
> ++ kernel_mds_state=$(@sysctl@ -n hw.mds_disable_state
> 2>/dev/null)
> + else
> + kernel_mds_state=inactive
> + fi
> +@@ -5296,16 +5296,16 @@ check_mds_linux()
> + _info_nol "* Kernel supports using MD_CLEAR
> mitigation: "
> + kernel_md_clear=''
> + kernel_md_clear_can_tell=1
> +- if [ "$opt_live" = 1 ] && grep ^flags
> "$procfs/cpuinfo" | grep -qw md_clear; then
> ++ if [ "$opt_live" = 1 ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw md_clear; then
> + kernel_md_clear="md_clear found in
> $procfs/cpuinfo"
> + pstatus green YES "$kernel_md_clear"
> + fi
> + if [ -z "$kernel_md_clear" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + kernel_md_clear_can_tell=0
> + elif [ -n "$kernel_err" ]; then
> + kernel_md_clear_can_tell=0
> +- elif "${opt_arch_prefix}strings" "$kernel" |
> grep -q 'Clear CPU buffers'; then
> ++ elif "@strings@" "$kernel" | @grep@ -q 'Clear
> CPU buffers'; then
> + _debug "md_clear: found 'Clear CPU
> buffers' string in kernel image"
> + kernel_md_clear='found md_clear
> implementation evidence in kernel image'
> + pstatus green YES "$kernel_md_clear"
> +@@ -5321,7 +5321,7 @@ check_mds_linux()
> +
> + if [ "$opt_live" = 1 ] && [
> "$sys_interface_available" = 1 ]; then
> + _info_nol "* Kernel mitigation is enabled and
> active: "
> +- if echo "$fullmsg" | grep -qi ^mitigation;
> then
> ++ if echo "$fullmsg" | @grep@ -qi ^mitigation;
> then
> + mds_mitigated=1
> + pstatus green YES
> + else
> +@@ -5329,7 +5329,7 @@ check_mds_linux()
> + pstatus yellow NO
> + fi
> + _info_nol "* SMT is either mitigated or
> disabled: "
> +- if echo "$fullmsg" | grep -Eq 'SMT
> (disabled|mitigated)'; then
> ++ if echo "$fullmsg" | @grep@ -Eq 'SMT
> (disabled|mitigated)'; then
> + mds_smt_mitigated=1
> + pstatus green YES
> + else
> +@@ -5415,7 +5415,7 @@ check_CVE_2019_11135()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2019_11135_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2019_11135_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5436,7 +5436,7 @@ check_CVE_2019_11135_linux()
> + kernel_taa=''
> + if [ -n "$kernel_err" ]; then
> + kernel_taa_err="$kernel_err"
> +- elif grep -q 'tsx_async_abort' "$kernel"; then
> ++ elif @grep@ -q 'tsx_async_abort' "$kernel"; then
> + kernel_taa="found tsx_async_abort in kernel
> image"
> + fi
> + if [ -n "$kernel_taa" ]; then
> +@@ -5450,7 +5450,7 @@ check_CVE_2019_11135_linux()
> + _info_nol "* TAA mitigation enabled and active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qE
> '^Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qE
> '^Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5485,9 +5485,9 @@ check_CVE_2019_11135_linux()
> + else
> + if [ "$opt_paranoid" = 1 ]; then
> + # in paranoid mode, TSX or SMT enabled are
> not OK, even if TAA is mitigated
> +- if ! echo "$fullmsg" | grep -qF 'TSX
> disabled'; then
> ++ if ! echo "$fullmsg" | @grep@ -qF 'TSX
> disabled'; then
> + pvulnstatus $cve VULN "TSX must be
> disabled for full mitigation"
> +- elif echo "$fullmsg" | grep -qF 'SMT
> vulnerable'; then
> ++ elif echo "$fullmsg" | @grep@ -qF 'SMT
> vulnerable'; then
> + pvulnstatus $cve VULN "SMT
> (HyperThreading) must be disabled for full mitigation"
> + else
> + pvulnstatus $cve "$status" "$msg"
> +@@ -5517,7 +5517,7 @@ check_CVE_2018_12207()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_12207_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_12207_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5541,7 +5541,7 @@ check_CVE_2018_12207_linux()
> + if [ -n "$kernel_err" ]; then
> + kernel_itlbmh_err="$kernel_err"
> + # commit 5219505fcbb640e273a0d51c19c38de0100ec5a9
> +- elif grep -q 'itlb_multihit' "$kernel"; then
> ++ elif @grep@ -q 'itlb_multihit' "$kernel"; then
> + kernel_itlbmh="found itlb_multihit in kernel
> image"
> + fi
> + if [ -n "$kernel_itlbmh" ]; then
> +@@ -5555,7 +5555,7 @@ check_CVE_2018_12207_linux()
> + _info_nol "* iTLB Multihit mitigation enabled and
> active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qF
> 'Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qF
> 'Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5597,7 +5597,7 @@ check_CVE_2018_12207_linux()
> + check_CVE_2018_12207_bsd()
> + {
> + _info_nol "* Kernel supports disabling superpages for
> executable mappings under EPT: "
> +- kernel_2m_x_ept=$(sysctl -n vm.pmap.allow_2m_x_ept
> 2>/dev/null)
> ++ kernel_2m_x_ept=$(@sysctl@ -n vm.pmap.allow_2m_x_ept
> 2>/dev/null)
> + if [ -z "$kernel_2m_x_ept" ]; then
> + pstatus yellow NO
> + else
> +@@ -5634,7 +5634,7 @@ check_CVE_2020_0543()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2020_0543_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2020_0543_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5655,7 +5655,7 @@ check_CVE_2020_0543_linux()
> + kernel_srbds=''
> + if [ -n "$kernel_err" ]; then
> + kernel_srbds_err="$kernel_err"
> +- elif grep -q 'Dependent on hypervisor' "$kernel";
> then
> ++ elif @grep@ -q 'Dependent on hypervisor' "$kernel";
> then
> + kernel_srbds="found SRBDS implementation
> evidence in kernel image. Your kernel is up to date for SRBDS
> mitigation"
> + fi
> + if [ -n "$kernel_srbds" ]; then
> +@@ -5668,7 +5668,7 @@ check_CVE_2020_0543_linux()
> + _info_nol "* SRBDS mitigation control is enabled and
> active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qE
> '^Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qE
> '^Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5758,8 +5758,8 @@ fi
> + # now run the checks the user asked for
> + for cve in $supported_cve_list
> + do
> +- if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | grep -qw
> "$cve"; then
> +- check_"$(echo "$cve" | tr - _)"
> ++ if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | @grep@ -
> qw "$cve"; then
> ++ check_"$(echo "$cve" | @tr@ - _)"
> + _info
> + fi
> + done
> +@@ -5773,17 +5773,17 @@ if [ "$bad_accuracy" = 1 ]; then
> + _warn "We're missing some kernel info (see -v), accuracy
> might be reduced"
> + fi
> +
> +-_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | grep -v -F 'mockme=' |
> sort | tr "\n" '|')
> ++_vars=$(set | @grep@ -Ev '^[A-Z_[:space:]]' | @grep@ -v -F
> 'mockme=' | @sort@ | @tr@ "\n" '|')
> + _debug "variables at end of script: $_vars"
> +
> + if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
> +- if command -v "gzip" >/dev/null 2>&1; then
> ++ if command -v "@gzip@" >/dev/null 2>&1; then
> + # not a useless use of cat: gzipping cpuinfo directly
> doesn't work well
> + # shellcheck disable=SC2002
> +- if command -v "base64" >/dev/null 2>&1; then
> +- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c |
> base64 -w0)"
> +- elif command -v "uuencode" >/dev/null 2>&1; then
> +- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c |
> uuencode -m - | grep -Fv 'begin-base64' | grep -Fxv -- '====' | tr -d
> "\n")"
> ++ if command -v "@base64@" >/dev/null 2>&1; then
> ++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@
> -c | @base64@ -w0)"
> ++ elif command -v "@uuencode@" >/dev/null 2>&1; then
> ++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@
> -c | @uuencode@ -m - | @grep@ -Fv 'begin-base64' | @grep@ -Fxv --
> '====' | @tr@ -d "\n")"
> + fi
> + fi
> + if [ -n "$mock_cpuinfo" ]; then
> +@@ -5792,7 +5792,7 @@ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ];
> then
> + fi
> + _info ""
> + # shellcheck disable=SC2046
> +- _warn "To mock this CPU, set those vars: "$(echo "$mockme" |
> sort -u)
> ++ _warn "To mock this CPU, set those vars: "$(echo "$mockme" |
> @sort@ -u)
> + fi
> +
> + if [ "$opt_explain" = 0 ]; then
> +--
> +2.38.1
> +
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-
> guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-
> checker-support-guix-system-kernel.patch
> new file mode 100644
> index 0000000000..afec52b418
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-
> system-kernel.patch
> @@ -0,0 +1,26 @@
> +From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Sat, 5 Nov 2022 23:22:31 +0800
> +Subject: [PATCH] Add support for Guix System kernel.
> +
> +---
> + spectre-meltdown-checker.sh | 2 ++
> + 1 file changed, 2 insertions(+)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 248a444..855a090 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
> + [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> + # NixOS:
> + [ -e "/run/booted-system/kernel" ] &&
> opt_kernel="/run/booted-system/kernel"
> ++ # Guix System:
> ++ [ -e "/run/booted-system/kernel/bzImage" ] &&
> opt_kernel="/run/booted-system/kernel/bzImage"
> + # systemd kernel-install:
> + [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux"
> + # Clear Linux:
> +
> +base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
> +--
> +2.38.0
>
> base-commit: 70df5c47a89f4f353a1df94467581a0f0da599a4
> --
> 2.38.1
Haven't looked at all the other substituted commands, but otherwise
seems good to me.
Cheers
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v3] gnu: Add spectre-meltdown-checker.
2022-11-11 15:13 ` Liliana Marie Prikler
@ 2022-11-12 12:14 ` Hilton Chain via Guix-patches via
2022-11-12 12:28 ` Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-12 12:14 UTC (permalink / raw)
To: Liliana Marie Prikler; +Cc: 59053
* gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
* gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch:
New file.
* gnu/local.mk (dist_patch_DATA): Add patches.
---
v2 -> v3:
1. Use curl as default downloader (It seems that wget doesn't work out of the
box for TLS?).
2. Remove instead of commenting.
3. Remove builtin firmware database via a snippet.
4. Adjust position of the "return 2" statement. For the purpose, it's there to
stop the version checking function, as later steps assumes a valid firmware
database. For the very value, it's that return value of is_latest_known_ucode()
other than 0 or 1, is considered "unknown" in the final output.
gnu/local.mk | 3 +
gnu/packages/linux.scm | 58 +
...ker-remove-builtin-firmware-database.patch | 113 +
...cker-stage-commands-for-substitution.patch | 1947 +++++++++++++++++
...n-checker-support-guix-system-kernel.patch | 26 +
5 files changed, 2147 insertions(+)
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index e3e02314bb..46b299d0d6 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1857,6 +1857,9 @@ dist_patch_DATA = \
%D%/packages/patches/syslinux-strip-gnu-property.patch \
%D%/packages/patches/snappy-add-O2-flag-in-CmakeLists.txt.patch \
%D%/packages/patches/snappy-add-inline-for-GCC.patch \
+ %D%/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch \
+ %D%/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch \
+ %D%/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch \
%D%/packages/patches/sphinxbase-fix-doxygen.patch \
%D%/packages/patches/spice-vdagent-glib-2.68.patch \
%D%/packages/patches/sssd-optional-systemd.patch \
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index fea33dfa0b..b15899baf6 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -9595,3 +9595,61 @@ (define-public edac-utils
error detection and correction (EDAC).")
(home-page "https://github.com/grondo/edac-utils")
(license license:gpl2+)))
+
+(define-public spectre-meltdown-checker
+ (package
+ (name "spectre-meltdown-checker")
+ (version "0.45")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/speed47/spectre-meltdown-checker")
+ (commit (string-append "v" version))))
+ (file-name (git-file-name name version))
+ (patches
+ (search-patches
+ ;; https://github.com/speed47/spectre-meltdown-checker/pull/441
+ "spectre-meltdown-checker-support-guix-system-kernel.patch"
+ ;; NOTE: Update these patches when updating.
+ "spectre-meltdown-checker-stage-commands-for-substitution.patch"
+ "spectre-meltdown-checker-remove-builtin-firmware-database.patch"))
+ ;; Remove builtin firmware database.
+ (modules '((guix build utils)))
+ (snippet '(substitute* "spectre-meltdown-checker.sh"
+ (("^# [AI],.*") "")))
+ (sha256
+ (base32
+ "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
+ (build-system copy-build-system)
+ (arguments
+ (list #:install-plan
+ #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-checker"))
+ #:phases
+ #~(modify-phases %standard-phases
+ (add-after 'unpack 'fixpath
+ (lambda* (#:key inputs #:allow-other-keys)
+ (substitute* "spectre-meltdown-checker.sh"
+ (("@sysctl@") (search-input-file inputs "/sbin/sysctl"))
+ (("@([a-z0-9]*)@" _ command _)
+ (search-input-file
+ inputs (string-append "/bin/" command)))))))))
+ (inputs
+ (list binutils
+ coreutils
+ grep
+ kmod
+ lz4
+ lzop
+ perl
+ procps
+ sharutils
+ util-linux
+ which
+ zstd))
+ (home-page "https://github.com/speed47/spectre-meltdown-checker")
+ (synopsis "CPU vulnerability / mitigation checker")
+ (description
+ "This package provides a shell script to assess your system's resilience
+against the several transient execution CVEs that were published since early
+2018, and give you guidance as to how to mitigate them.")
+ (license license:gpl3)))
diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
new file mode 100644
index 0000000000..400d8d3a07
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
@@ -0,0 +1,113 @@
+From e2cc68814cf658638946e069406ef6a6032ab318 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 12 Nov 2022 19:49:36 +0800
+Subject: [PATCH 2/2] Remove references to the builtin firmware database.
+
+---
+ spectre-meltdown-checker.sh | 43 +++++++++++--------------------------
+ 1 file changed, 12 insertions(+), 31 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 82cf1b6..5104599 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -95,7 +95,6 @@ show_usage()
+ --cpu [#,all] interact with CPUID and MSR of CPU core number #, or all (default: CPU core 0)
+ --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome
+ MCExtractor project and the Intel firmwares GitHub repository)
+- --update-builtin-fwdb same as --update-fwdb but update builtin DB inside the script itself
+ --dump-mock-data used to mimick a CPU on an other system, mainly used to help debugging this script
+
+ Return codes:
+@@ -853,10 +852,10 @@ update_fwdb()
+ mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
+ mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+ _info_nol "Fetching MCE.db from the MCExtractor project... "
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
++ if command -v curl >/dev/null 2>&1; then
+ curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
++ elif command -v wget >/dev/null 2>&1; then
++ wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
+ elif command -v fetch >/dev/null 2>&1; then
+ fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+ else
+@@ -874,10 +873,10 @@ update_fwdb()
+ intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+ _info_nol "Fetching Intel firmwares... "
+ ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
++ if command -v curl >/dev/null 2>&1; then
+ curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
++ elif command -v wget >/dev/null 2>&1; then
++ wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
+ elif command -v fetch >/dev/null 2>&1; then
+ fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+ else
+@@ -968,14 +967,6 @@ update_fwdb()
+ sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
+ } > "$mcedb_cache"
+ echo DONE "(version $dbversion)"
+-
+- if [ "$1" = builtin ]; then
+- newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
+- @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- @cat@ "$newfile" > "$0"
+- @rm@ -f "$newfile"
+- fi
+ }
+
+ parse_opt_file()
+@@ -1070,9 +1061,6 @@ while [ -n "${1:-}" ]; do
+ elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb" ]; then
+ update_fwdb
+ exit $?
+- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--update-builtin-mcedb" ]; then
+- update_fwdb builtin
+- exit $?
+ elif [ "$1" = "--dump-mock-data" ]; then
+ opt_mock=1
+ shift
+@@ -2033,21 +2021,11 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+- # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | @sort@ -V | @head@ -n1)
+- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+- mcedb_source="$mcedb_cache"
+- mcedb_info="local firmwares DB $local_dbversion"
+- fi
+-fi
+-# if mcedb_source is not set, either we don't have a local cached db, or it is older than the builtin db
+-if [ -z "${mcedb_source:-}" ]; then
+- mcedb_source="$0"
+- mcedb_info="builtin firmwares DB $builtin_dbversion"
++ mcedb_source="$mcedb_cache"
++ mcedb_info="local firmwares DB $local_dbversion"
+ fi
+ read_mcedb()
+ {
+@@ -2063,7 +2041,10 @@ is_latest_known_ucode()
+ return 2
+ fi
+ ucode_latest="latest microcode version for your CPU model is unknown"
+- if is_intel; then
++ if [ -z "$mcedb_source" ]; then
++ # When $mcedb_source is not set, skip version checking and report unknown.
++ return 2
++ elif is_intel; then
+ cpu_brand_prefix=I
+ elif is_amd; then
+ cpu_brand_prefix=A
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
new file mode 100644
index 0000000000..a2f13e4195
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
@@ -0,0 +1,1947 @@
+From 4dc8ae01aec5a8a2aa2afc015603261d514620ae Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Fri, 11 Nov 2022 18:49:50 +0800
+Subject: [PATCH 1/2] Stage commands for later substitution.
+
+awk, base64, basename, bunzip2, cat, cut, dd, dirname, dmesg, find, getent,
+grep, gunzip, gzip, head, id, lz4, lzop, mktemp, modprobe, mount, nm,
+nproc, objdump, od, perl, pgrep, readelf, rm, rmmod, sed, sort, stat,
+strings, sysctl, tr, umount, uname, unlzma, unxz, unzstd, uuencode, which,
+whoami, xargs.
+---
+ spectre-meltdown-checker.sh | 648 ++++++++++++++++++------------------
+ 1 file changed, 324 insertions(+), 324 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 30f760c..82cf1b6 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -19,33 +19,33 @@ trap '_warn "interrupted, cleaning up..."; exit_cleanup; exit 1' INT
+ exit_cleanup()
+ {
+ # cleanup the temp decompressed config & kernel image
+- [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm -f "$dumped_config"
+- [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm -f "$kerneltmp"
+- [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm -f "$kerneltmp2"
+- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm -f "$mcedb_tmp"
+- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm -rf "$intel_tmp"
+- [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug 2>/dev/null
+- [ "${mounted_procfs:-}" = 1 ] && umount "$procfs" 2>/dev/null
+- [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
+- [ "${insmod_msr:-}" = 1 ] && rmmod msr 2>/dev/null
++ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && @rm@ -f "$dumped_config"
++ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && @rm@ -f "$kerneltmp"
++ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && @rm@ -f "$kerneltmp2"
++ [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && @rm@ -f "$mcedb_tmp"
++ [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && @rm@ -rf "$intel_tmp"
++ [ "${mounted_debugfs:-}" = 1 ] && @umount@ /sys/kernel/debug 2>/dev/null
++ [ "${mounted_procfs:-}" = 1 ] && @umount@ "$procfs" 2>/dev/null
++ [ "${insmod_cpuid:-}" = 1 ] && @rmmod@ cpuid 2>/dev/null
++ [ "${insmod_msr:-}" = 1 ] && @rmmod@ msr 2>/dev/null
+ [ "${kldload_cpuctl:-}" = 1 ] && kldunload cpuctl 2>/dev/null
+ [ "${kldload_vmm:-}" = 1 ] && kldunload vmm 2>/dev/null
+ }
+
+ # if we were git clone'd, adjust VERSION
+-if [ -d "$(dirname "$0")/.git" ] && command -v git >/dev/null 2>&1; then
+- describe=$(git -C "$(dirname "$0")" describe --tags --dirty 2>/dev/null)
+- [ -n "$describe" ] && VERSION=$(echo "$describe" | sed -e s/^v//)
++if [ -d "$(@dirname@ "$0")/.git" ] && command -v git >/dev/null 2>&1; then
++ describe=$(git -C "$(@dirname@ "$0")" describe --tags --dirty 2>/dev/null)
++ [ -n "$describe" ] && VERSION=$(echo "$describe" | @sed@ -e s/^v//)
+ fi
+
+ show_usage()
+ {
+ # shellcheck disable=SC2086
+- cat <<EOF
++ @cat@ <<EOF
+ Usage:
+- Live mode (auto): $(basename $0) [options]
+- Live mode (manual): $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
+- Offline mode: $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
++ Live mode (auto): $(@basename@ $0) [options]
++ Live mode (manual): $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
++ Offline mode: $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
+
+ Modes:
+ Two modes are available.
+@@ -110,7 +110,7 @@ EOF
+
+ show_disclaimer()
+ {
+- cat <<EOF
++ @cat@ <<EOF
+ Disclaimer:
+
+ This tool does its best to determine whether your system is immune (or has proper mitigations in place) for the
+@@ -138,7 +138,7 @@ This tool has been released in the hope that it'll be useful, but don't use it t
+ EOF
+ }
+
+-os=$(uname -s)
++os=$(@uname@ -s)
+
+ # parse options
+ opt_kernel=''
+@@ -207,7 +207,7 @@ __echo()
+ _interpret_chars='-e'
+ fi
+ _ctrlchar=$($echo_cmd $_interpret_chars "\033")
+- _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
++ _msg=$($echo_cmd $_interpret_chars "$_msg" | @sed@ -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
+ fi
+ if [ "$echo_cmd_type" = printf ]; then
+ if [ "$opt" = "-n" ]; then
+@@ -383,7 +383,7 @@ is_cpu_affected()
+ # https://github.com/crozone/SpectrePoC/issues/1 ^F E5200 => spectre 2 not affected
+ # https://github.com/paboldin/meltdown-exploit/issues/19 ^F E5200 => meltdown affected
+ # model name : Pentium(R) Dual-Core CPU E5200 @ 2.50GHz
+- if echo "$cpu_friendly_name" | grep -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
++ if echo "$cpu_friendly_name" | @grep@ -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ variant3=vuln
+@@ -486,7 +486,7 @@ is_cpu_affected()
+ i=$(( i + 1 ))
+ # do NOT quote $cpu_arch_list below
+ # shellcheck disable=SC2086
+- cpuarch=$(echo $cpu_arch_list | awk '{ print $'$i' }')
++ cpuarch=$(echo $cpu_arch_list | @awk@ '{ print $'$i' }')
+ _debug "checking cpu$i: <$cpupart> <$cpuarch>"
+ # some kernels report AArch64 instead of 8
+ [ "$cpuarch" = "AArch64" ] && cpuarch=8
+@@ -497,49 +497,49 @@ is_cpu_affected()
+ # part ? ? c08 c09 c0d c0f c0e d07 d08 d09 d0a d0b d0c d0d
+ # arch 7? 7? 7 7 7 7 7 8 8 8 8 8 8 8
+ #
+- # Whitelist identified non-affected processors, use vulnerability information from
++ # Whitelist identified non-affected processors, use vulnerability information from
+ # https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
+ # Partnumbers can be found here:
+ # https://github.com/gcc-mirror/gcc/blob/master/gcc/config/arm/arm-cpus.in
+ #
+ # Maintain cumulative check of vulnerabilities -
+ # if at least one of the cpu is affected, then the system is affected
+- if [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
++ if [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A8/A9/A12/A17 non affected to variants 3, 3a & 4"
+- elif [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc0f; then
++ elif [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc0f; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A15 non affected to variants 3 & 4"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd07 -e 0xd08; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd07 -e 0xd08; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A57/A72 non affected to variants 3"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd09; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd09; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A73 non affected to variants 3 & 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0a; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0a; then
+ variant1=vuln
+ variant2=vuln
+ variant3=vuln
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A75 non affected to variant 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ [ -z "$variant3" ] && variant3=immune
+@@ -820,7 +820,7 @@ is_cpu_ssb_free()
+ if [ "$cpu_family" = "18" ] || \
+ [ "$cpu_family" = "17" ] || \
+ [ "$cpu_family" = "16" ] || \
+- [ "$cpu_family" = "15" ]; then
++ [ "$cpu_family" = "15" ]; then
+ return 0
+ fi
+ fi
+@@ -837,7 +837,7 @@ show_header()
+ _info
+ }
+
+-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
++[ -z "$HOME" ] && HOME="$(@getent@ passwd "$(@whoami@)" | @cut@ -d: -f6)"
+ mcedb_cache="$HOME/.mcedb"
+ update_fwdb()
+ {
+@@ -846,11 +846,11 @@ update_fwdb()
+ set -e
+
+ if [ -r "$mcedb_cache" ]; then
+- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
++ previous_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ fi
+
+ # first, download the MCE.db from the excellent platomav's MCExtractor project
+- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
++ mcedb_tmp="$(@mktemp@ -t smc-mcedb-XXXXXX)"
+ mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+ _info_nol "Fetching MCE.db from the MCExtractor project... "
+ if command -v wget >/dev/null 2>&1; then
+@@ -870,7 +870,7 @@ update_fwdb()
+ echo DONE
+
+ # second, get the Intel firmwares from GitHub
+- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
++ intel_tmp="$(@mktemp@ -d -t smc-intelfw-XXXXXX)"
+ intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+ _info_nol "Fetching Intel firmwares... "
+ ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+@@ -930,20 +930,20 @@ update_fwdb()
+ fi
+ # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev 0x0217, size 5120
+ # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev 0x0107, size 5120
+- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
++ $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | @grep@ -wF sig | while read -r _line
+ do
+- _line=$( echo "$_line" | tr -d ',')
+- _cpuid=$( echo "$_line" | awk '{print $3}')
++ _line=$( echo "$_line" | @tr@ -d ',')
++ _cpuid=$( echo "$_line" | @awk@ '{print $3}')
+ _cpuid=$(( _cpuid ))
+ _cpuid=$(printf "0x%08X" "$_cpuid")
+- _date=$( echo "$_line" | awk '{print $6}' | tr -d '-')
+- _version=$(echo "$_line" | awk '{print $8}')
++ _date=$( echo "$_line" | @awk@ '{print $6}' | @tr@ -d '-')
++ _version=$(echo "$_line" | @awk@ '{print $8}')
+ _version=$(( _version ))
+ _version=$(printf "0x%08X" "$_version")
+ _sqlstm="$(printf "INSERT INTO Intel (origin,cpuid,version,yyyymmdd) VALUES (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")" "$(printf "%08X" "$_version")" "$_date")"
+ sqlite3 "$mcedb_tmp" "$_sqlstm"
+ done
+- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
++ _intel_timestamp=$(@stat@ -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
+ if [ -n "$_intel_timestamp" ]; then
+ # use this date, it matches the last commit date
+ _intel_latest_date=$(date +%Y%m%d -d @"$_intel_timestamp")
+@@ -964,17 +964,17 @@ update_fwdb()
+ {
+ echo "# Spectre & Meltdown Checker";
+ echo "# %%% MCEDB v$dbversion";
+- sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
++ sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
++ sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | @grep@ -v '^# .,0x00000000,';
+ } > "$mcedb_cache"
+ echo DONE "(version $dbversion)"
+
+ if [ "$1" = builtin ]; then
+- newfile=$(mktemp -t smc-builtin-XXXXXX)
+- awk '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- awk '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- cat "$newfile" > "$0"
+- rm -f "$newfile"
++ newfile=$(@mktemp@ -t smc-builtin-XXXXXX)
++ @awk@ '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
++ @awk@ '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
++ @cat@ "$newfile" > "$0"
++ @rm@ -f "$newfile"
+ fi
+ }
+
+@@ -1055,7 +1055,7 @@ while [ -n "${1:-}" ]; do
+ elif [ "$1" = "--cpu" ]; then
+ opt_cpu=$2
+ if [ "$opt_cpu" != all ]; then
+- if echo "$opt_cpu" | grep -Eq '^[0-9]+'; then
++ if echo "$opt_cpu" | @grep@ -Eq '^[0-9]+'; then
+ opt_cpu=$(( opt_cpu ))
+ else
+ echo "$0: error: --cpu should be an integer or 'all', got '$opt_cpu'" >&2
+@@ -1103,7 +1103,7 @@ while [ -n "${1:-}" ]; do
+ echo "$0: error: option --cve expects a parameter, supported CVEs are: $supported_cve_list" >&2
+ exit 255
+ fi
+- selected_cve=$(echo "$supported_cve_list" | grep -iwo "$2")
++ selected_cve=$(echo "$supported_cve_list" | @grep@ -iwo "$2")
+ if [ -n "$selected_cve" ]; then
+ opt_cve_list="$opt_cve_list $selected_cve"
+ opt_cve_all=0
+@@ -1308,14 +1308,14 @@ check_kernel()
+ # a damaged ELF file and validate it, check for stderr warnings too
+
+ # the warning "readelf: Warning: [16]: Link field (0) should index a symtab section./" can appear on valid kernels, ignore it
+- _readelf_warnings=$("${opt_arch_prefix}readelf" -S "$_file" 2>&1 >/dev/null | grep -v 'should index a symtab section' | tr "\n" "/"); ret=$?
+- _readelf_sections=$("${opt_arch_prefix}readelf" -S "$_file" 2>/dev/null | grep -c -e data -e text -e init)
+- _kernel_size=$(stat -c %s "$_file" 2>/dev/null || stat -f %z "$_file" 2>/dev/null || echo 10000)
++ _readelf_warnings=$("@readelf@" -S "$_file" 2>&1 >/dev/null | @grep@ -v 'should index a symtab section' | @tr@ "\n" "/"); ret=$?
++ _readelf_sections=$("@readelf@" -S "$_file" 2>/dev/null | @grep@ -c -e data -e text -e init)
++ _kernel_size=$(@stat@ -c %s "$_file" 2>/dev/null || @stat@ -f %z "$_file" 2>/dev/null || echo 10000)
+ _debug "check_kernel: ret=$? size=$_kernel_size sections=$_readelf_sections warnings=$_readelf_warnings"
+ if [ "$_mode" = desperate ]; then
+- if "${opt_arch_prefix}strings" "$_file" | grep -Eq '^Linux version '; then
++ if "@strings@" "$_file" | @grep@ -Eq '^Linux version '; then
+ _debug "check_kernel (desperate): ... matched!"
+- if [ "$_readelf_sections" = 0 ] && grep -qF -e armv6 -e armv7 "$_file"; then
++ if [ "$_readelf_sections" = 0 ] && @grep@ -qF -e armv6 -e armv7 "$_file"; then
+ _debug "check_kernel (desperate): raw arm binary found, adjusting objdump options"
+ objdump_options="-D -b binary -marm"
+ else
+@@ -1348,7 +1348,7 @@ try_decompress()
+
+ # Try to find the header ($1) and decompress from here
+ _debug "try_decompress: looking for $3 magic in $6"
+- for pos in $(tr "$1\n$2" "\n$2=" < "$6" | grep -abo "^$2")
++ for pos in $(@tr@ "$1\n$2" "\n$2=" < "$6" | @grep@ -abo "^$2")
+ do
+ _debug "try_decompress: magic for $3 found at offset $pos"
+ if ! command -v "$3" >/dev/null 2>&1; then
+@@ -1375,11 +1375,11 @@ try_decompress()
+ kernel="$kerneltmp"
+ _debug "try_decompress: decompressed with $3 successfully!"
+ return 0
+- elif [ "$3" != "cat" ]; then
++ elif [ "$3" != "@cat@" ]; then
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel, trying with an offset"
+- [ -z "$kerneltmp2" ] && kerneltmp2=$(mktemp -t smc-kernel-XXXXXX)
+- cat "$kerneltmp" > "$kerneltmp2"
+- try_decompress '\177ELF' xxy 'cat' '' cat "$kerneltmp2" && return 0
++ [ -z "$kerneltmp2" ] && kerneltmp2=$(@mktemp@ -t smc-kernel-XXXXXX)
++ @cat@ "$kerneltmp" > "$kerneltmp2"
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$kerneltmp2" && return 0
+ else
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel"
+ fi
+@@ -1391,12 +1391,12 @@ extract_kernel()
+ {
+ [ -n "${1:-}" ] || return 1
+ # Prepare temp files:
+- kerneltmp="$(mktemp -t smc-kernel-XXXXXX)"
++ kerneltmp="$(@mktemp@ -t smc-kernel-XXXXXX)"
+
+ # Initial attempt for uncompressed images or objects:
+ if check_kernel "$1"; then
+ _debug "extract_kernel: found kernel is valid, no decompression needed"
+- cat "$1" > "$kerneltmp"
++ @cat@ "$1" > "$kerneltmp"
+ kernel=$kerneltmp
+ return 0
+ fi
+@@ -1405,14 +1405,14 @@ extract_kernel()
+ for pass in 1 2; do
+ for mode in normal desperate; do
+ _debug "extract_kernel: pass $pass $mode mode"
+- try_decompress '\037\213\010' xy gunzip '' gunzip "$1" "$mode" "$pass" && return 0
+- try_decompress '\002\041\114\030' xyy 'lz4' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
+- try_decompress '\3757zXZ\000' abcde unxz '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress 'BZh' xy bunzip2 '' bzip2 "$1" "$mode" "$pass" && return 0
+- try_decompress '\135\0\0\0' xxx unlzma '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress '\211\114\132' xy 'lzop' '-d' lzop "$1" "$mode" "$pass" && return 0
+- try_decompress '\177ELF' xxy 'cat' '' cat "$1" "$mode" "$pass" && return 0
+- try_decompress '(\265/\375' xxy unzstd '' zstd "$1" "$mode" "$pass" && return 0
++ try_decompress '\037\213\010' xy @gunzip@ '' gunzip "$1" "$mode" "$pass" && return 0
++ try_decompress '\002\041\114\030' xyy '@lz4@' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
++ try_decompress '\3757zXZ\000' abcde @unxz@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress 'BZh' xy @bunzip2@ '' bzip2 "$1" "$mode" "$pass" && return 0
++ try_decompress '\135\0\0\0' xxx @unlzma@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress '\211\114\132' xy '@lzop@' '-d' lzop "$1" "$mode" "$pass" && return 0
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$1" "$mode" "$pass" && return 0
++ try_decompress '(\265/\375' xxy @unzstd@ '' zstd "$1" "$mode" "$pass" && return 0
+ done
+ done
+ # kernel_err might already have been populated by try_decompress() if we're missing one of the tools
+@@ -1429,7 +1429,7 @@ mount_debugfs()
+ {
+ if [ ! -e /sys/kernel/debug/sched_features ]; then
+ # try to mount the debugfs hierarchy ourselves and remember it to umount afterwards
+- mount -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
++ @mount@ -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
+ fi
+ }
+
+@@ -1440,12 +1440,12 @@ load_msr()
+ load_msr_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw msr "$procfs/modules" 2>/dev/null; then
+- modprobe msr 2>/dev/null && insmod_msr=1
++ if ! @grep@ -qw msr "$procfs/modules" 2>/dev/null; then
++ @modprobe@ msr 2>/dev/null && insmod_msr=1
+ _debug "attempted to load module msr, insmod_msr=$insmod_msr"
+ else
+ _debug "msr module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1463,12 +1463,12 @@ load_cpuid()
+ load_cpuid_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw cpuid "$procfs/modules" 2>/dev/null; then
+- modprobe cpuid 2>/dev/null && insmod_cpuid=1
++ if ! @grep@ -qw cpuid "$procfs/modules" 2>/dev/null; then
++ @modprobe@ cpuid 2>/dev/null && insmod_cpuid=1
+ _debug "attempted to load module cpuid, insmod_cpuid=$insmod_cpuid"
+ else
+ _debug "cpuid module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1557,7 +1557,7 @@ read_cpuid_one_core()
+ fi
+ # on some kernel versions, /dev/cpu/0/cpuid doesn't imply that the cpuid module is loaded, in that case dd returns an error,
+ # we use that fact to load the module if dd returns an error
+- if ! dd if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
++ if ! @dd@ if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
+ load_cpuid
+ fi
+ # we need _leaf to be converted to decimal for dd
+@@ -1568,14 +1568,14 @@ read_cpuid_one_core()
+ _ddskip=$(( _position / 16 ))
+ _odskip=$(( _position - _ddskip * 16 ))
+ # now read the value
+- _cpuid=$(dd if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | od -j $((_odskip * 16)) -A n -t u4)
++ _cpuid=$(@dd@ if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | @od@ -j $((_odskip * 16)) -A n -t u4)
+ elif [ -e /dev/cpuctl0 ]; then
+ # BSD
+ if [ ! -r /dev/cpuctl0 ]; then
+ read_cpuid_msg="Couldn't read cpuid info from cpuctl"
+ return $READ_CPUID_RET_ERR
+ fi
+- _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | cut -d: -f2-)
++ _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | @cut@ -d: -f2-)
+ # cpuid level 0x4, level_type 0x2: 0x1c004143 0x01c0003f 0x000001ff 0x00000000
+ else
+ read_cpuid_msg="Found no way to read cpuid info"
+@@ -1598,7 +1598,7 @@ read_cpuid_one_core()
+ fi
+
+ # get the value of the register we want
+- _reg=$(echo "$_cpuid" | awk '{print $'"$_register"'}')
++ _reg=$(echo "$_cpuid" | @awk@ '{print $'"$_register"'}')
+ # Linux returns it as decimal, BSD as hex, normalize to decimal
+ _reg=$(( _reg ))
+ # shellcheck disable=SC2046
+@@ -1626,11 +1626,11 @@ dmesg_grep()
+ # grep for something in dmesg, ensuring that the dmesg buffer
+ # has not been truncated
+ dmesg_grepped=''
+- if ! dmesg | grep -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
++ if ! @dmesg@ | @grep@ -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
+ # dmesg truncated
+ return 2
+ fi
+- dmesg_grepped=$(dmesg | grep -E "$1" | head -1)
++ dmesg_grepped=$(@dmesg@ | @grep@ -E "$1" | @head@ -1)
+ # not found:
+ [ -z "$dmesg_grepped" ] && return 1
+ # found, output is in $dmesg_grepped
+@@ -1647,12 +1647,12 @@ parse_cpu_details()
+ {
+ [ "${parse_cpu_details_done:-}" = 1 ] && return 0
+
+- if command -v nproc >/dev/null; then
+- number_of_cores=$(nproc)
+- elif echo "$os" | grep -q BSD; then
+- number_of_cores=$(sysctl -n hw.ncpu 2>/dev/null || echo 1)
++ if command -v @nproc@ >/dev/null; then
++ number_of_cores=$(@nproc@)
++ elif echo "$os" | @grep@ -q BSD; then
++ number_of_cores=$(@sysctl@ -n hw.ncpu 2>/dev/null || echo 1)
+ elif [ -e "$procfs/cpuinfo" ]; then
+- number_of_cores=$(grep -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
++ number_of_cores=$(@grep@ -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
+ else
+ # if we don't know, default to 1 CPU
+ number_of_cores=1
+@@ -1660,43 +1660,43 @@ parse_cpu_details()
+ max_core_id=$(( number_of_cores - 1 ))
+
+ if [ -e "$procfs/cpuinfo" ]; then
+- cpu_vendor=$( grep '^vendor_id' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
+- cpu_friendly_name=$(grep '^model name' "$procfs/cpuinfo" | cut -d: -f2- | head -1 | sed -e 's/^ *//')
++ cpu_vendor=$( @grep@ '^vendor_id' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
++ cpu_friendly_name=$(@grep@ '^model name' "$procfs/cpuinfo" | @cut@ -d: -f2- | @head@ -1 | @sed@ -e 's/^ *//')
+ # special case for ARM follows
+- if grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
++ if @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
+ cpu_vendor='ARM'
+ # some devices (phones or other) have several ARMs and as such different part numbers,
+ # an example is "bigLITTLE", so we need to store the whole list, this is needed for is_cpu_affected
+- cpu_part_list=$(awk '/CPU part/ {print $4}' "$procfs/cpuinfo")
+- cpu_arch_list=$(awk '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
++ cpu_part_list=$(@awk@ '/CPU part/ {print $4}' "$procfs/cpuinfo")
++ cpu_arch_list=$(@awk@ '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
+ # take the first one to fill the friendly name, do NOT quote the vars below
+ # shellcheck disable=SC2086
+- cpu_arch=$(echo $cpu_arch_list | awk '{ print $1 }')
++ cpu_arch=$(echo $cpu_arch_list | @awk@ '{ print $1 }')
+ # shellcheck disable=SC2086
+- cpu_part=$(echo $cpu_part_list | awk '{ print $1 }')
++ cpu_part=$(echo $cpu_part_list | @awk@ '{ print $1 }')
+ [ "$cpu_arch" = "AArch64" ] && cpu_arch=8
+ cpu_friendly_name="ARM"
+ [ -n "$cpu_arch" ] && cpu_friendly_name="$cpu_friendly_name v$cpu_arch"
+ [ -n "$cpu_part" ] && cpu_friendly_name="$cpu_friendly_name model $cpu_part"
+
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
+ cpu_vendor='CAVIUM'
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
+ cpu_vendor='PHYTIUM'
+ fi
+
+- cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" | awk '{print $4}' | grep -E '^[0-9]+$' | head -1)
+- cpu_model=$( grep '^model' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_stepping=$(grep '^stepping' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_ucode=$( grep '^microcode' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
++ cpu_family=$( @grep@ '^cpu family' "$procfs/cpuinfo" | @awk@ '{print $4}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_model=$( @grep@ '^model' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_stepping=$(@grep@ '^stepping' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_ucode=$( @grep@ '^microcode' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
+ else
+- cpu_vendor=$( dmesg | grep -i -m1 'Origin=' | cut -f2 -w | cut -f2 -d= | cut -f2 -d\" )
+- cpu_family=$( dmesg | grep -i -m1 'Family=' | cut -f4 -w | cut -f2 -d= )
++ cpu_vendor=$( @dmesg@ | @grep@ -i -m1 'Origin=' | @cut@ -f2 -w | @cut@ -f2 -d= | @cut@ -f2 -d\" )
++ cpu_family=$( @dmesg@ | @grep@ -i -m1 'Family=' | @cut@ -f4 -w | @cut@ -f2 -d= )
+ cpu_family=$(( cpu_family ))
+- cpu_model=$( dmesg | grep -i -m1 'Model=' | cut -f5 -w | cut -f2 -d= )
++ cpu_model=$( @dmesg@ | @grep@ -i -m1 'Model=' | @cut@ -f5 -w | @cut@ -f2 -d= )
+ cpu_model=$(( cpu_model ))
+- cpu_stepping=$( dmesg | grep -i -m1 'Stepping=' | cut -f6 -w | cut -f2 -d= )
+- cpu_friendly_name=$(sysctl -n hw.model 2>/dev/null)
++ cpu_stepping=$( @dmesg@ | @grep@ -i -m1 'Stepping=' | @cut@ -f6 -w | @cut@ -f2 -d= )
++ cpu_friendly_name=$(@sysctl@ -n hw.model 2>/dev/null)
+ fi
+
+ if [ -n "${SMC_MOCK_CPU_FRIENDLY_NAME:-}" ]; then
+@@ -1751,7 +1751,7 @@ parse_cpu_details()
+ # call CPUID
+ cpucontrol -i 1 /dev/cpuctl0 >/dev/null
+ # read MSR
+- cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | awk '{print $3}')
++ cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | @awk@ '{print $3}')
+ # convert to decimal
+ cpu_ucode=$(( cpu_ucode ))
+ # convert back to hex
+@@ -1770,7 +1770,7 @@ parse_cpu_details()
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CPU_UCODE='$cpu_ucode'")
+ fi
+
+- echo "$cpu_ucode" | grep -q ^0x && cpu_ucode=$(( cpu_ucode ))
++ echo "$cpu_ucode" | @grep@ -q ^0x && cpu_ucode=$(( cpu_ucode ))
+ ucode_found=$(printf "family 0x%x model 0x%x stepping 0x%x ucode 0x%x cpuid 0x%x" "$cpu_family" "$cpu_model" "$cpu_stepping" "$cpu_ucode" "$cpu_cpuid")
+
+ # also define those that we will need in other funcs
+@@ -1867,8 +1867,8 @@ is_cpu_smt_enabled()
+ {
+ # SMT / HyperThreading is enabled if siblings != cpucores
+ if [ -e "$procfs/cpuinfo" ]; then
+- _siblings=$(awk '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
+- _cpucores=$(awk '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
++ _siblings=$(@awk@ '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
++ _cpucores=$(@awk@ '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
+ if [ -n "$_siblings" ] && [ -n "$_cpucores" ]; then
+ if [ "$_siblings" = "$_cpucores" ]; then
+ return 1
+@@ -1916,10 +1916,10 @@ is_ucode_blacklisted()
+ $INTEL_FAM6_SANDYBRIDGE_X,0x06,0x61b \
+ $INTEL_FAM6_SANDYBRIDGE_X,0x07,0x712
+ do
+- model=$(echo "$tuple" | cut -d, -f1)
+- stepping=$(( $(echo "$tuple" | cut -d, -f2) ))
++ model=$(echo "$tuple" | @cut@ -d, -f1)
++ stepping=$(( $(echo "$tuple" | @cut@ -d, -f2) ))
+ if [ "$cpu_model" = "$model" ] && [ "$cpu_stepping" = "$stepping" ]; then
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
+ if [ "$cpu_ucode" = "$ucode" ]; then
+ _debug "is_ucode_blacklisted: we have a match! ($cpu_model/$cpu_stepping/$cpu_ucode)"
+ return 0
+@@ -2007,7 +2007,7 @@ is_xen_dom0()
+ return 1
+ fi
+
+- if [ -e "$procfs/xen/capabilities" ] && grep -q "control_d" "$procfs/xen/capabilities"; then
++ if [ -e "$procfs/xen/capabilities" ] && @grep@ -q "control_d" "$procfs/xen/capabilities"; then
+ return 0
+ else
+ return 1
+@@ -2033,12 +2033,12 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
++builtin_dbversion=$(@awk@ '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+- local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
++ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | sort -V | head -n1)
++ older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | @sort@ -V | @head@ -n1)
+ if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+ mcedb_source="$mcedb_cache"
+ mcedb_info="local firmwares DB $local_dbversion"
+@@ -2051,7 +2051,7 @@ if [ -z "${mcedb_source:-}" ]; then
+ fi
+ read_mcedb()
+ {
+- awk '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
++ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
+ }
+
+ is_latest_known_ucode()
+@@ -2070,10 +2070,10 @@ is_latest_known_ucode()
+ else
+ return 2
+ fi
+- for tuple in $(read_mcedb | grep "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
++ for tuple in $(read_mcedb | @grep@ "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
+ do
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
+- ucode_date=$(echo "$tuple" | cut -d, -f4 | sed -r 's=(....)(..)(..)=\1/\2/\3=')
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
++ ucode_date=$(echo "$tuple" | @cut@ -d, -f4 | @sed@ -r 's=(....)(..)(..)=\1/\2/\3=')
+ _debug "is_latest_known_ucode: with cpuid $cpu_cpuid has ucode $cpu_ucode, last known is $ucode from $ucode_date"
+ ucode_latest=$(printf "latest version is 0x%x dated $ucode_date according to $mcedb_info" "$ucode")
+ if [ "$cpu_ucode" -ge "$ucode" ]; then
+@@ -2098,7 +2098,7 @@ get_cmdline()
+ kernel_cmdline="$SMC_MOCK_CMDLINE"
+ return
+ else
+- kernel_cmdline=$(cat "$procfs/cmdline")
++ kernel_cmdline=$(@cat@ "$procfs/cmdline")
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CMDLINE='$kernel_cmdline'")
+ fi
+ }
+@@ -2106,7 +2106,7 @@ get_cmdline()
+ # ENTRYPOINT
+
+ # we can't do anything useful under WSL
+-if uname -a | grep -qE -- '-Microsoft #[0-9]+-Microsoft '; then
++if @uname@ -a | @grep@ -qE -- '-Microsoft #[0-9]+-Microsoft '; then
+ _warn "This script doesn't work under Windows Subsystem for Linux"
+ _warn "You should use the official Microsoft tool instead."
+ _warn "It can be found under https://aka.ms/SpeculationControlPS"
+@@ -2155,15 +2155,15 @@ fi
+
+ # if we're under a BSD, try to mount linprocfs for "$procfs/cpuinfo"
+ procfs=/proc
+-if echo "$os" | grep -q BSD; then
++if echo "$os" | @grep@ -q BSD; then
+ _debug "We're under BSD, check if we have procfs"
+- procfs=$(mount | awk '/^linprocfs/ { print $3; exit; }')
++ procfs=$(@mount@ | @awk@ '/^linprocfs/ { print $3; exit; }')
+ if [ -z "$procfs" ]; then
+ _debug "we don't, try to mount it"
+ procfs=/proc
+ [ -d /compat/linux/proc ] && procfs=/compat/linux/proc
+ test -d $procfs || mkdir $procfs
+- if mount -t linprocfs linprocfs $procfs 2>/dev/null; then
++ if @mount@ -t linprocfs linprocfs $procfs 2>/dev/null; then
+ mounted_procfs=1
+ _debug "procfs just mounted at $procfs"
+ else
+@@ -2195,14 +2195,14 @@ fi
+
+ if [ "$opt_live" = 1 ]; then
+ # root check (only for live mode, for offline mode, we already checked if we could read the files)
+- if [ "$(id -u)" -ne 0 ]; then
++ if [ "$(@id@ -u)" -ne 0 ]; then
+ _warn "Note that you should launch this script with root privileges to get accurate information."
+ _warn "We'll proceed but you might see permission denied errors."
+ _warn "To run it as root, you can try the following command: sudo $0"
+ _warn
+ fi
+ _info "Checking for vulnerabilities on current system"
+- _info "Kernel is \033[35m$os $(uname -r) $(uname -v) $(uname -m)\033[0m"
++ _info "Kernel is \033[35m$os $(@uname@ -r) $(@uname@ -v) $(@uname@ -m)\033[0m"
+ _info "CPU is \033[35m$cpu_friendly_name\033[0m"
+
+ # try to find the image of the current running kernel
+@@ -2210,12 +2210,12 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ # first, look for the BOOT_IMAGE hint in the kernel cmdline
+- elif echo "$kernel_cmdline" | grep -q 'BOOT_IMAGE='; then
+- opt_kernel=$(echo "$kernel_cmdline" | grep -Eo 'BOOT_IMAGE=[^ ]+' | cut -d= -f2)
++ elif echo "$kernel_cmdline" | @grep@ -q 'BOOT_IMAGE='; then
++ opt_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo 'BOOT_IMAGE=[^ ]+' | @cut@ -d= -f2)
+ _debug "found opt_kernel=$opt_kernel in $procfs/cmdline"
+ # if the boot partition is within a btrfs subvolume, strip the subvolume name
+ # if /boot is a separate subvolume, the remainder of the code in this section should handle it
+- if echo "$opt_kernel" | grep -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | sed "s:/@[^/]*::"); fi
++ if echo "$opt_kernel" | @grep@ -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | @sed@ "s:/@[^/]*::"); fi
+ # if we have a dedicated /boot partition, our bootloader might have just called it /
+ # so try to prepend /boot and see if we find anything
+ [ -e "/boot/$opt_kernel" ] && opt_kernel="/boot/$opt_kernel"
+@@ -2227,7 +2227,7 @@ if [ "$opt_live" = 1 ]; then
+ # if we didn't find a kernel, default to guessing
+ if [ ! -e "$opt_kernel" ]; then
+ # Fedora:
+- [ -e "/lib/modules/$(uname -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(uname -r)/vmlinuz"
++ [ -e "/lib/modules/$(@uname@ -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(@uname@ -r)/vmlinuz"
+ # Slackware:
+ [ -e "/boot/vmlinuz" ] && opt_kernel="/boot/vmlinuz"
+ # Arch aarch64:
+@@ -2241,24 +2241,24 @@ if [ "$opt_live" = 1 ]; then
+ # pine64
+ [ -e "/boot/pine64/Image" ] && opt_kernel="/boot/pine64/Image"
+ # generic:
+- [ -e "/boot/vmlinuz-$(uname -r)" ] && opt_kernel="/boot/vmlinuz-$(uname -r)"
+- [ -e "/boot/kernel-$( uname -r)" ] && opt_kernel="/boot/kernel-$( uname -r)"
+- [ -e "/boot/bzImage-$(uname -r)" ] && opt_kernel="/boot/bzImage-$(uname -r)"
++ [ -e "/boot/vmlinuz-$(@uname@ -r)" ] && opt_kernel="/boot/vmlinuz-$(@uname@ -r)"
++ [ -e "/boot/kernel-$( @uname@ -r)" ] && opt_kernel="/boot/kernel-$( @uname@ -r)"
++ [ -e "/boot/bzImage-$(@uname@ -r)" ] && opt_kernel="/boot/bzImage-$(@uname@ -r)"
+ # Gentoo:
+- [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
++ [ -e "/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)" ] && opt_kernel="/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
+ # Guix System:
+ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+- [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
++ [ -e "/etc/machine-id" ] && [ -e "/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux" ] && opt_kernel="/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux"
+ # Clear Linux:
+- str_uname=$(uname -r)
++ str_uname=$(@uname@ -r)
+ clear_linux_kernel="/lib/kernel/org.clearlinux.${str_uname##*.}.${str_uname%.*}"
+ [ -e "$clear_linux_kernel" ] && opt_kernel=$clear_linux_kernel
+ # Custom Arch seems to have the kernel path in its cmdline in the form "\directory\kernelimage",
+ # with actual \'s instead of /'s:
+- custom_arch_kernel=$(echo "$kernel_cmdline" | grep -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | tr "\\\\" "/" | tr -d '[:space:]')
++ custom_arch_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | @tr@ "\\\\" "/" | @tr@ -d '[:space:]')
+ if [ -n "$custom_arch_kernel" ] && [ -e "$custom_arch_kernel" ]; then
+ opt_kernel="$custom_arch_kernel"
+ fi
+@@ -2272,12 +2272,12 @@ if [ "$opt_live" = 1 ]; then
+ :
+ elif [ -e "$procfs/kallsyms" ] ; then
+ opt_map="$procfs/kallsyms"
+- elif [ -e "/lib/modules/$(uname -r)/System.map" ] ; then
+- opt_map="/lib/modules/$(uname -r)/System.map"
+- elif [ -e "/boot/System.map-$(uname -r)" ] ; then
+- opt_map="/boot/System.map-$(uname -r)"
+- elif [ -e "/lib/kernel/System.map-$(uname -r)" ]; then
+- opt_map="/lib/kernel/System.map-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/System.map" ] ; then
++ opt_map="/lib/modules/$(@uname@ -r)/System.map"
++ elif [ -e "/boot/System.map-$(@uname@ -r)" ] ; then
++ opt_map="/boot/System.map-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/System.map-$(@uname@ -r)" ]; then
++ opt_map="/lib/kernel/System.map-$(@uname@ -r)"
+ fi
+
+ # config
+@@ -2285,18 +2285,18 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ elif [ -e "$procfs/config.gz" ] ; then
+- dumped_config="$(mktemp -t smc-config-XXXXXX)"
+- gunzip -c "$procfs/config.gz" > "$dumped_config"
++ dumped_config="$(@mktemp@ -t smc-config-XXXXXX)"
++ @gunzip@ -c "$procfs/config.gz" > "$dumped_config"
+ # dumped_config will be deleted at the end of the script
+ opt_config="$dumped_config"
+- elif [ -e "/lib/modules/$(uname -r)/config" ]; then
+- opt_config="/lib/modules/$(uname -r)/config"
+- elif [ -e "/boot/config-$(uname -r)" ]; then
+- opt_config="/boot/config-$(uname -r)"
+- elif [ -e "/etc/kernels/kernel-config-$(uname -m)-$(uname -r)" ]; then
+- opt_config="/etc/kernels/kernel-config-$(uname -m)-$(uname -r)"
+- elif [ -e "/lib/kernel/config-$(uname -r)" ]; then
+- opt_config="/lib/kernel/config-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/config" ]; then
++ opt_config="/lib/modules/$(@uname@ -r)/config"
++ elif [ -e "/boot/config-$(@uname@ -r)" ]; then
++ opt_config="/boot/config-$(@uname@ -r)"
++ elif [ -e "/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)" ]; then
++ opt_config="/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/config-$(@uname@ -r)" ]; then
++ opt_config="/lib/kernel/config-$(@uname@ -r)"
+ fi
+ else
+ _info "Checking for vulnerabilities against specified kernel"
+@@ -2311,7 +2311,7 @@ else
+ fi
+
+ if [ "$os" = Linux ]; then
+- if [ -n "$opt_config" ] && ! grep -q '^CONFIG_' "$opt_config"; then
++ if [ -n "$opt_config" ] && ! @grep@ -q '^CONFIG_' "$opt_config"; then
+ # given file is invalid!
+ _warn "The kernel config file seems invalid, was expecting a plain-text file, ignoring it!"
+ opt_config=''
+@@ -2339,7 +2339,7 @@ if [ "$os" = Linux ]; then
+ fi
+
+ if [ -e "$opt_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ _debug "readelf not found"
+ kernel_err="missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the 'binutils' package"
+ elif [ "$opt_sysfs_only" = 1 ] || [ "$opt_hw_only" = 1 ]; then
+@@ -2357,20 +2357,20 @@ else
+ # vanilla kernels have with ^Linux version
+ # also try harder with some kernels (such as Red Hat) that don't have ^Linux version before their version string
+ # and check for FreeBSD
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E \
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E \
+ -e '^Linux version ' \
+ -e '^[[:alnum:]][^[:space:]]+ \([^[:space:]]+\) #[0-9]+ .+ (19|20)[0-9][0-9]$' \
+- -e '^FreeBSD [0-9]' | head -1)
++ -e '^FreeBSD [0-9]' | @head@ -1)
+ if [ -z "$kernel_version" ]; then
+ # try even harder with some kernels (such as ARM) that split the release (uname -r) and version (uname -v) in 2 adjacent strings
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | tr "\n" " ")
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | @tr@ "\n" " ")
+ fi
+ if [ -n "$kernel_version" ]; then
+ # in live mode, check if the img we found is the correct one
+ if [ "$opt_live" = 1 ]; then
+ _verbose "Kernel image is \033[35m$kernel_version"
+- if ! echo "$kernel_version" | grep -qF "$(uname -r)"; then
+- _warn "Possible discrepancy between your running kernel '$(uname -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
++ if ! echo "$kernel_version" | @grep@ -qF "$(@uname@ -r)"; then
++ _warn "Possible discrepancy between your running kernel '$(@uname@ -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
+ fi
+ else
+ _info "Kernel image is \033[35m$kernel_version"
+@@ -2398,11 +2398,11 @@ sys_interface_check()
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" = 0 ] && [ -r "$file" ]; then
+ :
+ else
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")_RET=1")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")_RET=1")
+ return 1
+ fi
+
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")_RET"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")_RET"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ _debug "sysfs: MOCKING enabled for $file func returns $(eval echo \$$_mockvarname)"
+@@ -2411,17 +2411,17 @@ sys_interface_check()
+ fi
+
+ [ -n "$regex" ] || regex='.*'
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ fullmsg="$(eval echo \$$_mockvarname)"
+- msg=$(echo "$fullmsg" | grep -Eo "$regex")
++ msg=$(echo "$fullmsg" | @grep@ -Eo "$regex")
+ _debug "sysfs: MOCKING enabled for $file, will return $fullmsg"
+ mocked=1
+ else
+- fullmsg=$(cat "$file")
+- msg=$(grep -Eo "$regex" "$file")
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")='$fullmsg'")
++ fullmsg=$(@cat@ "$file")
++ msg=$(@grep@ -Eo "$regex" "$file")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")='$fullmsg'")
+ fi
+ if [ "$mode" = silent ]; then
+ return 0
+@@ -2430,15 +2430,15 @@ sys_interface_check()
+ return 0
+ fi
+ _info_nol "* Mitigated according to the /sys interface: "
+- if echo "$msg" | grep -qi '^not affected'; then
++ if echo "$msg" | @grep@ -qi '^not affected'; then
+ # Not affected
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qEi '^(kvm: )?mitigation'; then
++ elif echo "$msg" | @grep@ -qEi '^(kvm: )?mitigation'; then
+ # Mitigation: PTI
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qi '^vulnerable'; then
++ elif echo "$msg" | @grep@ -qi '^vulnerable'; then
+ # Vulnerable
+ status=VULN
+ pstatus yellow NO "$fullmsg"
+@@ -2526,20 +2526,20 @@ write_msr_one_core()
+ # ret=4: msr doesn't exist, ret=127: msr.allow_writes=off
+ [ "$ret" = 127 ] && _write_denied=1
+ # or fallback to dd if it supports seek_bytes, we prefer it over perl because we can tell the difference between EPERM and EIO
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
+ _debug "write_msr: using dd"
+- dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
++ @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
+ # if it failed, inspect stderrto look for EPERM
+ if [ "$ret" != 0 ]; then
+- if dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | grep -qF 'Operation not permitted'; then
++ if @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | @grep@ -qF 'Operation not permitted'; then
+ _write_denied=1
+ fi
+ fi
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "write_msr: using perl"
+ ret=1
+- perl -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
++ @perl@ -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
+ else
+ _debug "write_msr: got no wrmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_ERR")
+@@ -2561,13 +2561,13 @@ write_msr_one_core()
+ msr_locked_down=1
+ write_msr_msg="your kernel is configured to deny writes to MSRs from user space"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "msr: Direct access to MSR"; then
++ elif @dmesg@ | @grep@ -qF "msr: Direct access to MSR"; then
+ _debug "write_msr: locked down kernel detected (Red Hat / Fedora)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+ write_msr_msg="your kernel is locked down (Fedora/Red Hat), please reboot without secure boot and retry"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "raw MSR access is restricted"; then
++ elif @dmesg@ | @grep@ -qF "raw MSR access is restricted"; then
+ _debug "write_msr: locked down kernel detected (vanilla)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+@@ -2666,8 +2666,8 @@ read_msr_one_core()
+ return $READ_MSR_RET_KO
+ fi
+ # MSR 0x10: 0x000003e1 0xb106dded
+- _msr_h=$(echo "$_msr" | awk '{print $3}');
+- _msr_l=$(echo "$_msr" | awk '{print $4}');
++ _msr_h=$(echo "$_msr" | @awk@ '{print $3}');
++ _msr_l=$(echo "$_msr" | @awk@ '{print $4}');
+ read_msr_value=$(( _msr_h << 32 | _msr_l ))
+ else
+ # for Linux
+@@ -2678,15 +2678,15 @@ read_msr_one_core()
+ # if rdmsr is available, use it
+ elif command -v rdmsr >/dev/null 2>&1 && [ "${SMC_NO_RDMSR:-}" != 1 ]; then
+ _debug "read_msr: using rdmsr on $_msr"
+- read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | @od@ -t u8 -A n)
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "read_msr: using perl on $_msr"
+- read_msr_value=$(perl -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | od -t u8 -A n)
++ read_msr_value=$(@perl@ -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | @od@ -t u8 -A n)
+ # fallback to dd if it supports skip_bytes
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
+ _debug "read_msr: using dd on $_msr"
+- read_msr_value=$(dd if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(@dd@ if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | @od@ -t u8 -A n)
+ else
+ _debug "read_msr: got no rdmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_RDMSR_${_msr}_RET=$READ_MSR_RET_ERR")
+@@ -2710,7 +2710,7 @@ check_cpu()
+ {
+ _info "\033[1;34mHardware check\033[0m"
+
+- if ! uname -m | grep -qwE 'x86_64|i[3-6]86|amd64'; then
++ if ! @uname@ -m | @grep@ -qwE 'x86_64|i[3-6]86|amd64'; then
+ return
+ fi
+
+@@ -3326,19 +3326,19 @@ check_redhat_canonical_spectre()
+ # if we were already called, don't do it again
+ [ -n "${redhat_canonical_spectre:-}" ] && return
+
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ redhat_canonical_spectre=-1
+ elif [ -n "$kernel_err" ]; then
+ redhat_canonical_spectre=-2
+ else
+ # Red Hat / Ubuntu specific variant1 patch is difficult to detect,
+ # let's use the two same tricks than the official Red Hat detection script uses:
+- if "${opt_arch_prefix}strings" "$kernel" | grep -qw noibrs && "${opt_arch_prefix}strings" "$kernel" | grep -qw noibpb; then
++ if "@strings@" "$kernel" | @grep@ -qw noibrs && "@strings@" "$kernel" | @grep@ -qw noibpb; then
+ # 1) detect their specific variant2 patch. If it's present, it means
+ # that the variant1 patch is also present (both were merged at the same time)
+ _debug "found redhat/canonical version of the variant2 patch (implies variant1)"
+ redhat_canonical_spectre=1
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'x86/pti:'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'x86/pti:'; then
+ # 2) detect their specific variant3 patch. If it's present, but the variant2
+ # is not, it means that only variant1 is present in addition to variant3
+ _debug "found redhat/canonical version of the variant3 patch (implies variant1 but not variant2)"
+@@ -3363,13 +3363,13 @@ check_has_vmm()
+ # If we find no evidence that this is the case, assume we're not (to avoid scaring users),
+ # this can always be overridden with --vmm in any case.
+ has_vmm=0
+- if command -v pgrep >/dev/null 2>&1; then
++ if command -v @pgrep@ >/dev/null 2>&1; then
+ # remove xenbus and xenwatch, also present inside domU
+ # remove libvirtd as it can also be used to manage containers and not VMs
+ # for each binary we want to grep, get the pids
+ for _binary in qemu kvm xenstored xenconsoled
+ do
+- for _pid in $(pgrep -x $_binary)
++ for _pid in $(@pgrep@ -x $_binary)
+ do
+ # resolve the exe symlink, if it doesn't resolve with -m,
+ # which doesn't even need the dest to exist, it means the symlink
+@@ -3385,7 +3385,7 @@ check_has_vmm()
+ else
+ # ignore SC2009 as `ps ax` is actually used as a fallback if `pgrep` isn't installed
+ # shellcheck disable=SC2009
+- if command -v ps >/devnull && ps ax | grep -vw grep | grep -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
++ if command -v ps >/devnull && ps ax | @grep@ -vw grep | @grep@ -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
+ has_vmm=1
+ fi
+ fi
+@@ -3417,7 +3417,7 @@ check_CVE_2017_5753()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5753_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5753_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3469,20 +3469,20 @@ check_CVE_2017_5753_linux()
+ v1_mask_nospec=''
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+ else
+- perl -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 64 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 64 bits array_index_mask_nospec"
+ else
+- perl -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 32 bits array_index_mask_nospec"
+ else
+- ret=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" | grep -w -e f3af8014 -e e320f014 -B2 | grep -B1 -w sbc | grep -w -c cmp)
++ ret=$("@objdump@" $objdump_options "$kernel" | @grep@ -w -e f3af8014 -e e320f014 -B2 | @grep@ -B1 -w sbc | @grep@ -w -c cmp)
+ if [ "$ret" -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of arm 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="arm 32 bits array_index_mask_nospec"
+@@ -3526,12 +3526,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" $objdump_options "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" $objdump_options "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "mask_nospec64 macro is present and used"
+ v1_mask_nospec="arm64 mask_nospec64"
+@@ -3553,12 +3553,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" -d "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" -d "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "array_index_nospec macro is present and used"
+ v1_mask_nospec="arm64 array_index_nospec"
+@@ -3574,7 +3574,7 @@ check_CVE_2017_5753_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ if ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+ # here we disassemble the kernel and count the number of occurrences of the LFENCE opcode
+@@ -3584,7 +3584,7 @@ check_CVE_2017_5753_linux()
+ # so let's push the threshold to 70.
+ # v0.33+: now only count lfence opcodes after a jump, way less error-prone
+ # non patched kernel have between 0 and 20 matches, patched ones have at least 40-45
+- nb_lfence=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" 2>/dev/null | grep -w -B1 lfence | grep -Ewc 'jmp|jne|je')
++ nb_lfence=$("@objdump@" $objdump_options "$kernel" 2>/dev/null | @grep@ -w -B1 lfence | @grep@ -Ewc 'jmp|jne|je')
+ if [ "$nb_lfence" -lt 30 ]; then
+ pstatus yellow NO "only $nb_lfence jump-then-lfence instructions found, should be >= 30 (heuristic)"
+ else
+@@ -3655,7 +3655,7 @@ check_CVE_2017_5715()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5715_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5715_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3697,13 +3697,13 @@ check_CVE_2017_5715_linux()
+ # /proc/sys/kernel/ibrs_enabled: OpenSUSE tumbleweed
+ specex_knob_dir=$dir
+ ibrs_supported="$dir/ibrs_enabled exists"
+- ibrs_enabled=$(cat "$dir/ibrs_enabled" 2>/dev/null)
++ ibrs_enabled=$(@cat@ "$dir/ibrs_enabled" 2>/dev/null)
+ _debug "ibrs: found $dir/ibrs_enabled=$ibrs_enabled"
+ # if ibrs_enabled is there, ibpb_enabled will be in the same dir
+ if [ -e "$dir/ibpb_enabled" ]; then
+ # if the file is there, we have IBPB compiled-in (see note above for IBRS)
+ ibpb_supported="$dir/ibpb_enabled exists"
+- ibpb_enabled=$(cat "$dir/ibpb_enabled" 2>/dev/null)
++ ibpb_enabled=$(@cat@ "$dir/ibpb_enabled" 2>/dev/null)
+ _debug "ibpb: found $dir/ibpb_enabled=$ibpb_enabled"
+ else
+ _debug "ibpb: $dir/ibpb_enabled file doesn't exist"
+@@ -3718,7 +3718,7 @@ check_CVE_2017_5715_linux()
+ # which in that case means ibrs is supported *and* enabled for kernel & user
+ # as per the ibrs patch series v3
+ if [ -z "$ibrs_supported" ]; then
+- if grep ^flags "$procfs/cpuinfo" | grep -qw spec_ctrl_ibrs; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw spec_ctrl_ibrs; then
+ _debug "ibrs: found spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ ibrs_supported="spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ # enabled=2 -> kernel & user
+@@ -3728,13 +3728,13 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -n "$fullmsg" ]; then
+ # when IBPB is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q 'IBPB'; then
++ if echo "$fullmsg" | @grep@ -q 'IBPB'; then
+ _debug "ibpb: found enabled in sysfs"
+ [ -z "$ibpb_supported" ] && ibpb_supported='IBPB found enabled in sysfs'
+ [ -z "$ibpb_enabled" ] && ibpb_enabled=1
+ fi
+ # when IBRS_FW is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q ', IBRS_FW'; then
++ if echo "$fullmsg" | @grep@ -q ', IBRS_FW'; then
+ _debug "ibrs: found IBRS_FW in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS_FW in sysfs'
+ ibrs_fw_enabled=1
+@@ -3742,13 +3742,13 @@ check_CVE_2017_5715_linux()
+ # when IBRS is enabled on 4.15+, we can see it in sysfs
+ # on a more recent kernel, classic "IBRS" is not even longer an option, because of the performance impact.
+ # only "Enhanced IBRS" is available (on CPUs with the IBRS_ALL flag)
+- if echo "$fullmsg" | grep -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
++ if echo "$fullmsg" | @grep@ -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
+ _debug "ibrs: found IBRS in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS in sysfs'
+ [ -z "$ibrs_enabled" ] && ibrs_enabled=3
+ fi
+ # checking for 'Enhanced IBRS' in sysfs, enabled on CPUs with IBRS_ALL
+- if echo "$fullmsg" | grep -q -e 'Enhanced IBRS'; then
++ if echo "$fullmsg" | @grep@ -q -e 'Enhanced IBRS'; then
+ [ -z "$ibrs_supported" ] && ibrs_supported='found Enhanced IBRS in sysfs'
+ # 4 isn't actually a valid value of the now extinct "ibrs_enabled" flag file,
+ # that only went from 0 to 3, so we use 4 as "enhanced ibrs is enabled"
+@@ -3767,11 +3767,11 @@ check_CVE_2017_5715_linux()
+ fi
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibrs_can_tell=1
+- ibrs_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e ', IBRS_FW' | head -1)
++ ibrs_supported=$("@strings@" "$kernel" | @grep@ -Fw -e ', IBRS_FW' | @head@ -1)
+ if [ -n "$ibrs_supported" ]; then
+ _debug "ibrs: found ibrs evidence in kernel image ($ibrs_supported)"
+ ibrs_supported="found '$ibrs_supported' in kernel image"
+@@ -3780,7 +3780,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$opt_map" ]; then
+ ibrs_can_tell=1
+- if grep -q spec_ctrl "$opt_map"; then
++ if @grep@ -q spec_ctrl "$opt_map"; then
+ ibrs_supported="found spec_ctrl in symbols file"
+ _debug "ibrs: found '*spec_ctrl*' symbol in $opt_map"
+ fi
+@@ -3788,11 +3788,11 @@ check_CVE_2017_5715_linux()
+ # recent (4.15) vanilla kernels have IBPB but not IBRS, and without the debugfs tunables of Red Hat
+ # we can detect it directly in the image
+ if [ -z "$ibpb_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibpb_can_tell=1
+- ibpb_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e 'ibpb' -e ', IBPB' | head -1)
++ ibpb_supported=$("@strings@" "$kernel" | @grep@ -Fw -e 'ibpb' -e ', IBPB' | @head@ -1)
+ if [ -n "$ibpb_supported" ]; then
+ _debug "ibpb: found ibpb evidence in kernel image ($ibpb_supported)"
+ ibpb_supported="found '$ibpb_supported' in kernel image"
+@@ -3841,9 +3841,9 @@ check_CVE_2017_5715_linux()
+ 2) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel, user space, and firmware code" ; else pstatus green YES "for both kernel and user space"; fi;;
+ 3) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel and firmware code"; else pstatus green YES; fi;;
+ 4) pstatus green YES "Enhanced flavor, performance impact will be greatly reduced";;
+- *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
+- then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
+- else
++ *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
++ then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
++ else
+ pstatus yellow UNKNOWN; fi;;
+ esac
+ fi
+@@ -3894,7 +3894,7 @@ check_CVE_2017_5715_linux()
+ bp_harden=''
+ if [ -r "$opt_config" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
++ bp_harden=$(@grep@ -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_config"
+@@ -3902,7 +3902,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$bp_harden" ] && [ -n "$opt_map" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w bp_hardening_data "$opt_map")
++ bp_harden=$(@grep@ -w bp_hardening_data "$opt_map")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_map"
+@@ -3920,11 +3920,11 @@ check_CVE_2017_5715_linux()
+ # We check the RETPOLINE kernel options
+ retpoline=0
+ if [ -r "$opt_config" ]; then
+- if grep -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
++ if @grep@ -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
+ pstatus green YES
+ retpoline=1
+ # shellcheck disable=SC2046
+- _debug 'retpoline: found '$(grep '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
++ _debug 'retpoline: found '$(@grep@ '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
+ else
+ pstatus yellow NO
+ fi
+@@ -3945,8 +3945,8 @@ check_CVE_2017_5715_linux()
+ # since 5.15.28, this is now "Retpolines" as the implementation was switched to a generic one,
+ # so we look for both "retpoline" and "retpolines"
+ if [ "$opt_live" = 1 ] && [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qwi -e retpoline -e retpolines; then
+- if echo "$fullmsg" | grep -qwi minimal; then
++ if echo "$fullmsg" | @grep@ -qwi -e retpoline -e retpolines; then
++ if echo "$fullmsg" | @grep@ -qwi minimal; then
+ retpoline_compiler=0
+ retpoline_compiler_reason="kernel reports minimal retpoline compilation"
+ else
+@@ -3956,19 +3956,19 @@ check_CVE_2017_5715_linux()
+ fi
+ elif [ -n "$opt_map" ]; then
+ # look for the symbol
+- if grep -qw noretpoline_setup "$opt_map"; then
++ if @grep@ -qw noretpoline_setup "$opt_map"; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup symbol found in System.map"
+ fi
+ elif [ -n "$kernel" ]; then
+ # look for the symbol
+- if command -v "${opt_arch_prefix}nm" >/dev/null 2>&1; then
++ if command -v "@nm@" >/dev/null 2>&1; then
+ # the proper way: use nm and look for the symbol
+- if "${opt_arch_prefix}nm" "$kernel" 2>/dev/null | grep -qw 'noretpoline_setup'; then
++ if "@nm@" "$kernel" 2>/dev/null | @grep@ -qw 'noretpoline_setup'; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup found in kernel symbols"
+ fi
+- elif grep -q noretpoline_setup "$kernel"; then
++ elif @grep@ -q noretpoline_setup "$kernel"; then
+ # if we don't have nm, nevermind, the symbol name is long enough to not have
+ # any false positive using good old grep directly on the binary
+ retpoline_compiler=1
+@@ -3997,7 +3997,7 @@ check_CVE_2017_5715_linux()
+ retp_enabled=-1
+ if [ "$opt_live" = 1 ]; then
+ if [ -e "$specex_knob_dir/retp_enabled" ]; then
+- retp_enabled=$(cat "$specex_knob_dir/retp_enabled" 2>/dev/null)
++ retp_enabled=$(@cat@ "$specex_knob_dir/retp_enabled" 2>/dev/null)
+ _debug "retpoline: found $specex_knob_dir/retp_enabled=$retp_enabled"
+ _info_nol " * Retpoline is enabled: "
+ if [ "$retp_enabled" = 1 ]; then
+@@ -4027,7 +4027,7 @@ check_CVE_2017_5715_linux()
+ rsb_filling=0
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" != 1 ]; then
+ # if we're live and we aren't denied looking into /sys, let's do it
+- if echo "$msg" | grep -qw RSB; then
++ if echo "$msg" | @grep@ -qw RSB; then
+ rsb_filling=1
+ pstatus green YES
+ fi
+@@ -4036,7 +4036,7 @@ check_CVE_2017_5715_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if grep -qw -e 'Filling RSB on context switch' "$kernel"; then
++ if @grep@ -qw -e 'Filling RSB on context switch' "$kernel"; then
+ rsb_filling=1
+ pstatus green YES
+ else
+@@ -4198,7 +4198,7 @@ check_CVE_2017_5715_bsd()
+ {
+ _info "* Mitigation 1"
+ _info_nol " * Kernel supports IBRS: "
+- ibrs_disabled=$(sysctl -n hw.ibrs_disable 2>/dev/null)
++ ibrs_disabled=$(@sysctl@ -n hw.ibrs_disable 2>/dev/null)
+ if [ -z "$ibrs_disabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4206,7 +4206,7 @@ check_CVE_2017_5715_bsd()
+ fi
+
+ _info_nol " * IBRS enabled and active: "
+- ibrs_active=$(sysctl -n hw.ibrs_active 2>/dev/null)
++ ibrs_active=$(@sysctl@ -n hw.ibrs_active 2>/dev/null)
+ if [ "$ibrs_active" = 1 ]; then
+ pstatus green YES
+ else
+@@ -4219,10 +4219,10 @@ check_CVE_2017_5715_bsd()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the binutils package"
+ else
+- nb_thunks=$("${opt_arch_prefix}readelf" -s "$kernel" | grep -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
++ nb_thunks=$("@readelf@" -s "$kernel" | @grep@ -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
+ if [ "$nb_thunks" -gt 0 ]; then
+ retpoline=1
+ pstatus green YES "found $nb_thunks thunk(s)"
+@@ -4263,7 +4263,7 @@ check_CVE_2017_5715_bsd()
+ pti_performance_check()
+ {
+ _info_nol " * Reduced performance impact of PTI: "
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw pcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pcid; then
+ cpu_pcid=1
+ else
+ read_cpuid 0x1 0x0 $ECX 17 1 1; ret=$?
+@@ -4272,7 +4272,7 @@ pti_performance_check()
+ fi
+ fi
+
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw invpcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw invpcid; then
+ cpu_invpcid=1
+ else
+ read_cpuid 0x7 0x0 $EBX 10 1 1; ret=$?
+@@ -4297,7 +4297,7 @@ check_CVE_2017_5754()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5754_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5754_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4319,7 +4319,7 @@ check_CVE_2017_5754_linux()
+ kpti_can_tell=0
+ if [ -n "$opt_config" ]; then
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
++ kpti_support=$(@grep@ -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found option '$kpti_support' in $opt_config"
+ fi
+@@ -4329,7 +4329,7 @@ check_CVE_2017_5754_linux()
+ # so we try to find an exported symbol that is part of the PTI patch in System.map
+ # parse_kpti: arm
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e kpti_force_enabled -e parse_kpti "$opt_map")
++ kpti_support=$(@grep@ -w -e kpti_force_enabled -e parse_kpti "$opt_map")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $opt_map"
+ fi
+@@ -4339,10 +4339,10 @@ check_CVE_2017_5754_linux()
+ # nopti option that is part of the patch (kernel command line option)
+ # 'kpti=': arm
+ kpti_can_tell=1
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ else
+- kpti_support=$("${opt_arch_prefix}strings" "$kernel" | grep -w -e nopti -e kpti=)
++ kpti_support=$("@strings@" "$kernel" | @grep@ -w -e nopti -e kpti=)
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $kernel"
+ fi
+@@ -4369,20 +4369,20 @@ check_CVE_2017_5754_linux()
+ dmesg_grep="$dmesg_grep|x86/pti: Unmapping kernel while in userspace"
+ # aarch64
+ dmesg_grep="$dmesg_grep|CPU features: detected( feature)?: Kernel page table isolation \(KPTI\)"
+- if grep ^flags "$procfs/cpuinfo" | grep -qw pti; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pti; then
+ # vanilla PTI patch sets the 'pti' flag in cpuinfo
+ _debug "kpti_enabled: found 'pti' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+- elif grep ^flags "$procfs/cpuinfo" | grep -qw kaiser; then
++ elif @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw kaiser; then
+ # kernel line 4.9 sets the 'kaiser' flag in cpuinfo
+ _debug "kpti_enabled: found 'kaiser' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+ elif [ -e /sys/kernel/debug/x86/pti_enabled ]; then
+ # Red Hat Backport creates a dedicated file, see https://access.redhat.com/articles/3311301
+- kpti_enabled=$(cat /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
++ kpti_enabled=$(@cat@ /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
+ _debug "kpti_enabled: file /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
+ elif is_xen_dom0; then
+- pti_xen_pv_domU=$(xl dmesg | grep 'XPTI' | grep 'DomU enabled' | head -1)
++ pti_xen_pv_domU=$(xl @dmesg@ | @grep@ 'XPTI' | @grep@ 'DomU enabled' | @head@ -1)
+
+ [ -n "$pti_xen_pv_domU" ] && kpti_enabled=1
+ fi
+@@ -4457,7 +4457,7 @@ check_CVE_2017_5754_linux()
+ if [ -n "$kpti_support" ]; then
+ if [ -e "/sys/kernel/debug/x86/pti_enabled" ]; then
+ explain "Your kernel supports PTI but it's disabled, you can enable it with \`echo 1 > /sys/kernel/debug/x86/pti_enabled\`"
+- elif echo "$kernel_cmdline" | grep -q -w -e nopti -e pti=off; then
++ elif echo "$kernel_cmdline" | @grep@ -q -w -e nopti -e pti=off; then
+ explain "Your kernel supports PTI but it has been disabled on command-line, remove the nopti or pti=off option from your bootloader configuration"
+ else
+ explain "Your kernel supports PTI but it has been disabled, check \`dmesg\` right after boot to find clues why the system disabled it"
+@@ -4508,7 +4508,7 @@ check_CVE_2017_5754_linux()
+ check_CVE_2017_5754_bsd()
+ {
+ _info_nol "* Kernel supports Page Table Isolation (PTI): "
+- kpti_enabled=$(sysctl -n vm.pmap.pti 2>/dev/null)
++ kpti_enabled=$(@sysctl@ -n vm.pmap.pti 2>/dev/null)
+ if [ -z "$kpti_enabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4579,7 +4579,7 @@ check_CVE_2018_3639()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3639_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3639_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4598,33 +4598,33 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports disabling speculative store bypass (SSB): "
+ if [ "$opt_live" = 1 ]; then
+- if grep -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssb="found in $procfs/self/status"
+ _debug "found Speculation.Store.Bypass: in $procfs/self/status"
+ fi
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! grep -q 'arm64_sys_' "$kernel"; then
+- kernel_ssb=$("${opt_arch_prefix}strings" "$kernel" | grep spec_store_bypass | head -n1);
++ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! @grep@ -q 'arm64_sys_' "$kernel"; then
++ kernel_ssb=$("@strings@" "$kernel" | @grep@ spec_store_bypass | @head@ -n1);
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in kernel"
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! grep -q 'arm64_sys_' "$opt_map"; then
+- kernel_ssb=$(grep spec_store_bypass "$opt_map" | awk '{print $3}' | head -n1)
++ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! @grep@ -q 'arm64_sys_' "$opt_map"; then
++ kernel_ssb=$(@grep@ spec_store_bypass "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ # arm64 only:
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ]; then
+- kernel_ssb=$(grep -w cpu_enable_ssbs "$opt_map" | awk '{print $3}' | head -n1)
++ kernel_ssb=$(@grep@ -w cpu_enable_ssbs "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_config" ]; then
+- kernel_ssb=$(grep -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
++ kernel_ssb=$(@grep@ -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
+ [ -n "$kernel_ssb" ] && kernel_ssb="CONFIG_ARM64_SSBD enabled in kconfig"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ]; then
+ # this string only appears in kernel if CONFIG_ARM64_SSBD is set
+- kernel_ssb=$(grep -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
++ kernel_ssb=$(@grep@ -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
+ [ -n "$kernel_ssb" ] && kernel_ssb="found 'Speculative Store Bypassing Safe (SSBS)' in kernel"
+ fi
+ # /arm64 only
+@@ -4639,31 +4639,31 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_live" = 1 ]; then
+ # https://elixir.bootlin.com/linux/v5.0/source/fs/proc/array.c#L340
+ _info_nol "* SSB mitigation is enabled and active: "
+- if grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=1
+ pstatus green YES "per-thread through prctl"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=2
+ pstatus green YES "global"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus yellow NO
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=-2
+ pstatus blue NO "not vulnerable"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus blue NO
+ else
+- pstatus blue UNKNOWN "unknown value: $(grep -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | cut -d: -f2-)"
++ pstatus blue UNKNOWN "unknown value: $(@grep@ -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | @cut@ -d: -f2-)"
+ fi
+
+ if [ "$kernel_ssbd_enabled" = 1 ]; then
+ _info_nol "* SSB mitigation currently active for selected processes: "
+ # silence grep's stderr here to avoid ENOENT errors from processes that have exited since the shell's expansion of the *
+- mitigated_processes=$(find /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
+- | xargs -r0 grep -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
+- | sed s/status/exe/ | xargs -r -n1 readlink -f 2>/dev/null | xargs -r -n1 basename | sort -u | tr "\n" " " | sed 's/ $//')
++ mitigated_processes=$(@find@ /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
++ | @xargs@ -r0 @grep@ -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
++ | @sed@ s/status/exe/ | @xargs@ -r -n1 readlink -f 2>/dev/null | @xargs@ -r -n1 @basename@ | @sort@ -u | @tr@ "\n" " " | @sed@ 's/ $//')
+ if [ -n "$mitigated_processes" ]; then
+ pstatus green YES "$mitigated_processes"
+ else
+@@ -4715,7 +4715,7 @@ check_CVE_2018_3639_linux()
+ check_CVE_2018_3639_bsd()
+ {
+ _info_nol "* Kernel supports speculation store bypass: "
+- if sysctl hw.spec_store_bypass_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.spec_store_bypass_disable >/dev/null 2>&1; then
+ kernel_ssb=1
+ pstatus green YES
+ else
+@@ -4724,7 +4724,7 @@ check_CVE_2018_3639_bsd()
+ fi
+
+ _info_nol "* Speculation store bypass is administratively enabled: "
+- ssb_enabled=$(sysctl -n hw.spec_store_bypass_disable 2>/dev/null)
++ ssb_enabled=$(@sysctl@ -n hw.spec_store_bypass_disable 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable=$ssb_enabled"
+ case "$ssb_enabled" in
+ 0) pstatus yellow NO "disabled";;
+@@ -4734,7 +4734,7 @@ check_CVE_2018_3639_bsd()
+ esac
+
+ _info_nol "* Speculation store bypass is currently active: "
+- ssb_active=$(sysctl -n hw.spec_store_bypass_disable_active 2>/dev/null)
++ ssb_active=$(@sysctl@ -n hw.spec_store_bypass_disable_active 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable_active=$ssb_active"
+ case "$ssb_active" in
+ 1) pstatus green YES;;
+@@ -4806,7 +4806,7 @@ check_CVE_2018_3620()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3620_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3620_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4824,14 +4824,14 @@ check_CVE_2018_3620_linux()
+ fi
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports PTE inversion: "
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'strings' tool, please install it"
+ pteinv_supported=-1
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "$kernel_err"
+ pteinv_supported=-1
+ else
+- if "${opt_arch_prefix}strings" "$kernel" | grep -Fq 'PTE Inversion'; then
++ if "@strings@" "$kernel" | @grep@ -Fq 'PTE Inversion'; then
+ pstatus green YES "found in kernel image"
+ _debug "pteinv: found pte inversion evidence in kernel image"
+ pteinv_supported=1
+@@ -4844,7 +4844,7 @@ check_CVE_2018_3620_linux()
+ _info_nol "* PTE inversion enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -q 'Mitigation: PTE Inversion'; then
++ if echo "$fullmsg" | @grep@ -q 'Mitigation: PTE Inversion'; then
+ pstatus green YES
+ pteinv_active=1
+ else
+@@ -4892,7 +4892,7 @@ check_CVE_2018_3620_bsd()
+ else
+ _debug "vmm module already loaded"
+ fi
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ # https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
+ # this is very difficult to detect that the kernel reserved the 0 page, but this fix
+ # is part of the exact same patch than the other L1TF CVE, so we detect it
+@@ -4922,7 +4922,7 @@ check_CVE_2018_3646()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3646_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3646_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4948,7 +4948,7 @@ check_CVE_2018_3646_linux()
+ if [ "$opt_live" = 1 ]; then
+ if ! [ -r /sys/module/kvm_intel/parameters/ept ]; then
+ pstatus blue N/A "the kvm_intel module is not loaded"
+- elif [ "$(cat /sys/module/kvm_intel/parameters/ept)" = N ]; then
++ elif [ "$(@cat@ /sys/module/kvm_intel/parameters/ept)" = N ]; then
+ pstatus green YES
+ ept_disabled=1
+ else
+@@ -4960,15 +4960,15 @@ check_CVE_2018_3646_linux()
+
+ _info "* Mitigation 2"
+ _info_nol " * L1D flush is supported by kernel: "
+- if [ "$opt_live" = 1 ] && grep -qw flush_l1d "$procfs/cpuinfo"; then
++ if [ "$opt_live" = 1 ] && @grep@ -qw flush_l1d "$procfs/cpuinfo"; then
+ l1d_kernel="found flush_l1d in $procfs/cpuinfo"
+ fi
+ if [ -z "$l1d_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ l1d_kernel_err="missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ elif [ -n "$kernel_err" ]; then
+ l1d_kernel_err="$kernel_err"
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -qw flush_l1d; then
++ elif "@strings@" "$kernel" | @grep@ -qw flush_l1d; then
+ l1d_kernel='found flush_l1d in kernel image'
+ fi
+ fi
+@@ -4989,20 +4989,20 @@ check_CVE_2018_3646_linux()
+ # $l1dstatus is one of (auto|vulnerable|conditional cache flushes|cache flushes|EPT disabled|flush not necessary)
+ # $smtstatus is one of (vulnerable|disabled)
+ # can also just be "Not affected"
+- if echo "$fullmsg" | grep -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
++ if echo "$fullmsg" | @grep@ -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
+ l1d_mode=0
+ pstatus yellow NO
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) conditional cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) conditional cache flushes'; then
+ l1d_mode=1
+ pstatus green YES "conditional flushes"
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) cache flushes'; then
+ l1d_mode=2
+ pstatus green YES "unconditional flushes"
+ else
+ if is_xen_dom0; then
+- l1d_xen_hardware=$(xl dmesg | grep 'Hardware features:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_hypervisor=$(xl dmesg | grep 'Xen settings:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_pv_domU=$(xl dmesg | grep 'PV L1TF shadowing:' | grep 'DomU enabled' | head -1)
++ l1d_xen_hardware=$(xl @dmesg@ | @grep@ 'Hardware features:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_hypervisor=$(xl @dmesg@ | @grep@ 'Xen settings:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_pv_domU=$(xl @dmesg@ | @grep@ 'PV L1TF shadowing:' | @grep@ 'DomU enabled' | @head@ -1)
+
+ if [ -n "$l1d_xen_hardware" ] && [ -n "$l1d_xen_hypervisor" ] && [ -n "$l1d_xen_pv_domU" ]; then
+ l1d_mode=5
+@@ -5033,7 +5033,7 @@ check_CVE_2018_3646_linux()
+
+ _info_nol " * Hardware-backed L1D flush supported: "
+ if [ "$opt_live" = 1 ]; then
+- if grep -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
++ if @grep@ -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
+ pstatus green YES "performance impact of the mitigation will be greatly reduced"
+ else
+ pstatus blue NO "flush will be done in software, this is slower"
+@@ -5105,7 +5105,7 @@ check_CVE_2018_3646_linux()
+ check_CVE_2018_3646_bsd()
+ {
+ _info_nol "* Kernel supports L1D flushing: "
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_l1d_supported=1
+ else
+@@ -5114,7 +5114,7 @@ check_CVE_2018_3646_bsd()
+ fi
+
+ _info_nol "* L1D flushing is enabled: "
+- kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush 2>/dev/null)
++ kernel_l1d_enabled=$(@sysctl@ -n hw.vmm.vmx.l1d_flush 2>/dev/null)
+ case "$kernel_l1d_enabled" in
+ 0) pstatus yellow NO;;
+ 1) pstatus green YES;;
+@@ -5168,7 +5168,7 @@ check_CVE_2018_12127()
+ ###################
+ # MDSUM SECTION
+
+-# Microarchitectural Data Sampling Uncacheable Memory
++# Microarchitectural Data Sampling Uncacheable Memory
+ check_CVE_2019_11091()
+ {
+ cve='CVE-2019-11091'
+@@ -5182,7 +5182,7 @@ check_mds()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_mds_linux "$cve"
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_mds_bsd "$cve"
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5193,7 +5193,7 @@ check_mds_bsd()
+ {
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ if [ "$opt_live" = 1 ]; then
+- if sysctl hw.mds_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.mds_disable >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5201,7 +5201,7 @@ check_mds_bsd()
+ kernel_md_clear=0
+ fi
+ else
+- if grep -Fq hw.mds_disable $opt_kernel; then
++ if @grep@ -Fq hw.mds_disable $opt_kernel; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5211,8 +5211,8 @@ check_mds_bsd()
+ fi
+
+ _info_nol "* CPU Hyper-Threading (SMT) is disabled: "
+- if sysctl machdep.hyperthreading_allowed >/dev/null 2>&1; then
+- kernel_smt_allowed=$(sysctl -n machdep.hyperthreading_allowed 2>/dev/null)
++ if @sysctl@ machdep.hyperthreading_allowed >/dev/null 2>&1; then
++ kernel_smt_allowed=$(@sysctl@ -n machdep.hyperthreading_allowed 2>/dev/null)
+ if [ "$kernel_smt_allowed" = 1 ]; then
+ pstatus yellow NO
+ else
+@@ -5224,7 +5224,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is enabled: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_enabled=$(sysctl -n hw.mds_disable 2>/dev/null)
++ kernel_mds_enabled=$(@sysctl@ -n hw.mds_disable 2>/dev/null)
+ else
+ kernel_mds_enabled=0
+ fi
+@@ -5238,7 +5238,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is active: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_state=$(sysctl -n hw.mds_disable_state 2>/dev/null)
++ kernel_mds_state=$(@sysctl@ -n hw.mds_disable_state 2>/dev/null)
+ else
+ kernel_mds_state=inactive
+ fi
+@@ -5296,16 +5296,16 @@ check_mds_linux()
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ kernel_md_clear=''
+ kernel_md_clear_can_tell=1
+- if [ "$opt_live" = 1 ] && grep ^flags "$procfs/cpuinfo" | grep -qw md_clear; then
++ if [ "$opt_live" = 1 ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw md_clear; then
+ kernel_md_clear="md_clear found in $procfs/cpuinfo"
+ pstatus green YES "$kernel_md_clear"
+ fi
+ if [ -z "$kernel_md_clear" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ kernel_md_clear_can_tell=0
+ elif [ -n "$kernel_err" ]; then
+ kernel_md_clear_can_tell=0
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'Clear CPU buffers'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'Clear CPU buffers'; then
+ _debug "md_clear: found 'Clear CPU buffers' string in kernel image"
+ kernel_md_clear='found md_clear implementation evidence in kernel image'
+ pstatus green YES "$kernel_md_clear"
+@@ -5321,7 +5321,7 @@ check_mds_linux()
+
+ if [ "$opt_live" = 1 ] && [ "$sys_interface_available" = 1 ]; then
+ _info_nol "* Kernel mitigation is enabled and active: "
+- if echo "$fullmsg" | grep -qi ^mitigation; then
++ if echo "$fullmsg" | @grep@ -qi ^mitigation; then
+ mds_mitigated=1
+ pstatus green YES
+ else
+@@ -5329,7 +5329,7 @@ check_mds_linux()
+ pstatus yellow NO
+ fi
+ _info_nol "* SMT is either mitigated or disabled: "
+- if echo "$fullmsg" | grep -Eq 'SMT (disabled|mitigated)'; then
++ if echo "$fullmsg" | @grep@ -Eq 'SMT (disabled|mitigated)'; then
+ mds_smt_mitigated=1
+ pstatus green YES
+ else
+@@ -5415,7 +5415,7 @@ check_CVE_2019_11135()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2019_11135_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2019_11135_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5436,7 +5436,7 @@ check_CVE_2019_11135_linux()
+ kernel_taa=''
+ if [ -n "$kernel_err" ]; then
+ kernel_taa_err="$kernel_err"
+- elif grep -q 'tsx_async_abort' "$kernel"; then
++ elif @grep@ -q 'tsx_async_abort' "$kernel"; then
+ kernel_taa="found tsx_async_abort in kernel image"
+ fi
+ if [ -n "$kernel_taa" ]; then
+@@ -5450,7 +5450,7 @@ check_CVE_2019_11135_linux()
+ _info_nol "* TAA mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5485,9 +5485,9 @@ check_CVE_2019_11135_linux()
+ else
+ if [ "$opt_paranoid" = 1 ]; then
+ # in paranoid mode, TSX or SMT enabled are not OK, even if TAA is mitigated
+- if ! echo "$fullmsg" | grep -qF 'TSX disabled'; then
++ if ! echo "$fullmsg" | @grep@ -qF 'TSX disabled'; then
+ pvulnstatus $cve VULN "TSX must be disabled for full mitigation"
+- elif echo "$fullmsg" | grep -qF 'SMT vulnerable'; then
++ elif echo "$fullmsg" | @grep@ -qF 'SMT vulnerable'; then
+ pvulnstatus $cve VULN "SMT (HyperThreading) must be disabled for full mitigation"
+ else
+ pvulnstatus $cve "$status" "$msg"
+@@ -5517,7 +5517,7 @@ check_CVE_2018_12207()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_12207_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_12207_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5541,7 +5541,7 @@ check_CVE_2018_12207_linux()
+ if [ -n "$kernel_err" ]; then
+ kernel_itlbmh_err="$kernel_err"
+ # commit 5219505fcbb640e273a0d51c19c38de0100ec5a9
+- elif grep -q 'itlb_multihit' "$kernel"; then
++ elif @grep@ -q 'itlb_multihit' "$kernel"; then
+ kernel_itlbmh="found itlb_multihit in kernel image"
+ fi
+ if [ -n "$kernel_itlbmh" ]; then
+@@ -5555,7 +5555,7 @@ check_CVE_2018_12207_linux()
+ _info_nol "* iTLB Multihit mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qF 'Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qF 'Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5597,7 +5597,7 @@ check_CVE_2018_12207_linux()
+ check_CVE_2018_12207_bsd()
+ {
+ _info_nol "* Kernel supports disabling superpages for executable mappings under EPT: "
+- kernel_2m_x_ept=$(sysctl -n vm.pmap.allow_2m_x_ept 2>/dev/null)
++ kernel_2m_x_ept=$(@sysctl@ -n vm.pmap.allow_2m_x_ept 2>/dev/null)
+ if [ -z "$kernel_2m_x_ept" ]; then
+ pstatus yellow NO
+ else
+@@ -5634,7 +5634,7 @@ check_CVE_2020_0543()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2020_0543_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2020_0543_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5655,7 +5655,7 @@ check_CVE_2020_0543_linux()
+ kernel_srbds=''
+ if [ -n "$kernel_err" ]; then
+ kernel_srbds_err="$kernel_err"
+- elif grep -q 'Dependent on hypervisor' "$kernel"; then
++ elif @grep@ -q 'Dependent on hypervisor' "$kernel"; then
+ kernel_srbds="found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation"
+ fi
+ if [ -n "$kernel_srbds" ]; then
+@@ -5668,7 +5668,7 @@ check_CVE_2020_0543_linux()
+ _info_nol "* SRBDS mitigation control is enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5758,8 +5758,8 @@ fi
+ # now run the checks the user asked for
+ for cve in $supported_cve_list
+ do
+- if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | grep -qw "$cve"; then
+- check_"$(echo "$cve" | tr - _)"
++ if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | @grep@ -qw "$cve"; then
++ check_"$(echo "$cve" | @tr@ - _)"
+ _info
+ fi
+ done
+@@ -5773,17 +5773,17 @@ if [ "$bad_accuracy" = 1 ]; then
+ _warn "We're missing some kernel info (see -v), accuracy might be reduced"
+ fi
+
+-_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | grep -v -F 'mockme=' | sort | tr "\n" '|')
++_vars=$(set | @grep@ -Ev '^[A-Z_[:space:]]' | @grep@ -v -F 'mockme=' | @sort@ | @tr@ "\n" '|')
+ _debug "variables at end of script: $_vars"
+
+ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+- if command -v "gzip" >/dev/null 2>&1; then
++ if command -v "@gzip@" >/dev/null 2>&1; then
+ # not a useless use of cat: gzipping cpuinfo directly doesn't work well
+ # shellcheck disable=SC2002
+- if command -v "base64" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | base64 -w0)"
+- elif command -v "uuencode" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | uuencode -m - | grep -Fv 'begin-base64' | grep -Fxv -- '====' | tr -d "\n")"
++ if command -v "@base64@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @base64@ -w0)"
++ elif command -v "@uuencode@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @uuencode@ -m - | @grep@ -Fv 'begin-base64' | @grep@ -Fxv -- '====' | @tr@ -d "\n")"
+ fi
+ fi
+ if [ -n "$mock_cpuinfo" ]; then
+@@ -5792,7 +5792,7 @@ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+ fi
+ _info ""
+ # shellcheck disable=SC2046
+- _warn "To mock this CPU, set those vars: "$(echo "$mockme" | sort -u)
++ _warn "To mock this CPU, set those vars: "$(echo "$mockme" | @sort@ -u)
+ fi
+
+ if [ "$opt_explain" = 0 ]; then
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
new file mode 100644
index 0000000000..afec52b418
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
@@ -0,0 +1,26 @@
+From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 5 Nov 2022 23:22:31 +0800
+Subject: [PATCH] Add support for Guix System kernel.
+
+---
+ spectre-meltdown-checker.sh | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 248a444..855a090 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
+ [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
++ # Guix System:
++ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+ [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
+ # Clear Linux:
+
+base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
+--
+2.38.0
base-commit: 2757de2e2b271d87f6f72ba4161c2225fbdc9e78
--
2.38.1
^ permalink raw reply related [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v3] gnu: Add spectre-meltdown-checker.
2022-11-12 12:14 ` [bug#59053] [PATCH v3] " Hilton Chain via Guix-patches via
@ 2022-11-12 12:28 ` Liliana Marie Prikler
2022-11-12 12:50 ` Hilton Chain via Guix-patches via
0 siblings, 1 reply; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-12 12:28 UTC (permalink / raw)
To: Hilton Chain; +Cc: 59053
Am Samstag, dem 12.11.2022 um 20:14 +0800 schrieb Hilton Chain:
> 1. Use curl as default downloader (It seems that wget doesn't work
> out of the box for TLS?).
Uhm, what exactly is the checker downloading that it needs wget or curl
for?
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v3] gnu: Add spectre-meltdown-checker.
2022-11-12 12:28 ` Liliana Marie Prikler
@ 2022-11-12 12:50 ` Hilton Chain via Guix-patches via
2022-11-12 13:40 ` Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-12 12:50 UTC (permalink / raw)
To: Liliana Marie Prikler; +Cc: 59053
On Sat, 12 Nov 2022 20:28:58 +0800,
Liliana Marie Prikler wrote:
> Uhm, what exactly is the checker downloading that it needs wget or curl
> for?
With option "--update-fwdb", the checker fetches source files and builds the firmware database.
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v3] gnu: Add spectre-meltdown-checker.
2022-11-12 12:50 ` Hilton Chain via Guix-patches via
@ 2022-11-12 13:40 ` Liliana Marie Prikler
2022-11-12 15:15 ` [bug#59053] [PATCH v4] " Hilton Chain via Guix-patches via
0 siblings, 1 reply; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-12 13:40 UTC (permalink / raw)
To: Hilton Chain; +Cc: 59053
Am Samstag, dem 12.11.2022 um 20:50 +0800 schrieb Hilton Chain:
> On Sat, 12 Nov 2022 20:28:58 +0800,
> Liliana Marie Prikler wrote:
> > Uhm, what exactly is the checker downloading that it needs wget or
> > curl for?
> With option "--update-fwdb", the checker fetches source files and
> builds the firmware database.
You mean proprietary firmware?
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v4] gnu: Add spectre-meltdown-checker.
2022-11-12 13:40 ` Liliana Marie Prikler
@ 2022-11-12 15:15 ` Hilton Chain via Guix-patches via
2022-11-12 16:58 ` Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-12 15:15 UTC (permalink / raw)
To: Liliana Marie Prikler; +Cc: 59053
* gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
* gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch:
New file.
* gnu/local.mk (dist_patch_DATA): Add patches.
---
v3 -> v4:
1. Remove downloading function.
2. Add option for supplying a local database.
gnu/local.mk | 3 +
gnu/packages/linux.scm | 54 +
...ker-remove-builtin-firmware-database.patch | 243 +++
...cker-stage-commands-for-substitution.patch | 1849 +++++++++++++++++
...n-checker-support-guix-system-kernel.patch | 26 +
5 files changed, 2175 insertions(+)
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index e3e02314bb..46b299d0d6 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1857,6 +1857,9 @@ dist_patch_DATA = \
%D%/packages/patches/syslinux-strip-gnu-property.patch \
%D%/packages/patches/snappy-add-O2-flag-in-CmakeLists.txt.patch \
%D%/packages/patches/snappy-add-inline-for-GCC.patch \
+ %D%/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch \
+ %D%/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch \
+ %D%/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch \
%D%/packages/patches/sphinxbase-fix-doxygen.patch \
%D%/packages/patches/spice-vdagent-glib-2.68.patch \
%D%/packages/patches/sssd-optional-systemd.patch \
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index fea33dfa0b..1807fd5655 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -9595,3 +9595,57 @@ (define-public edac-utils
error detection and correction (EDAC).")
(home-page "https://github.com/grondo/edac-utils")
(license license:gpl2+)))
+
+(define-public spectre-meltdown-checker
+ (package
+ (name "spectre-meltdown-checker")
+ (version "0.45")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/speed47/spectre-meltdown-checker")
+ (commit (string-append "v" version))))
+ (file-name (git-file-name name version))
+ (patches
+ (search-patches
+ ;; https://github.com/speed47/spectre-meltdown-checker/pull/441
+ "spectre-meltdown-checker-support-guix-system-kernel.patch"
+ ;; NOTE: Update these patches when updating.
+ "spectre-meltdown-checker-remove-builtin-firmware-database.patch"
+ "spectre-meltdown-checker-stage-commands-for-substitution.patch"))
+ ;; Remove builtin firmware database.
+ (modules '((guix build utils)))
+ (snippet '(substitute* "spectre-meltdown-checker.sh"
+ (("^# [AI],.*") "")))
+ (sha256
+ (base32
+ "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
+ (build-system copy-build-system)
+ (arguments
+ (list #:install-plan
+ #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-checker"))
+ #:phases
+ #~(modify-phases %standard-phases
+ (add-after 'unpack 'fixpath
+ (lambda* (#:key inputs #:allow-other-keys)
+ (substitute* "spectre-meltdown-checker.sh"
+ (("@sysctl@") (search-input-file inputs "/sbin/sysctl"))
+ (("@([a-z0-9]*)@" _ command _)
+ (search-input-file
+ inputs (string-append "/bin/" command)))))))))
+ (inputs
+ (list kmod
+ lz4
+ lzop
+ perl
+ procps
+ sharutils
+ util-linux
+ zstd))
+ (home-page "https://github.com/speed47/spectre-meltdown-checker")
+ (synopsis "CPU vulnerability / mitigation checker")
+ (description
+ "This package provides a shell script to assess your system's resilience
+against the several transient execution CVEs that were published since early
+2018, and give you guidance as to how to mitigate them.")
+ (license license:gpl3)))
diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
new file mode 100644
index 0000000000..888bb0c2b1
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
@@ -0,0 +1,243 @@
+From a3a9b7ca93071393e6bfd999fedd737009718aab Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 12 Nov 2022 22:45:24 +0800
+Subject: [PATCH 1/2] Remove builtin firmware database.
+
+1. Remove downloading function.
+2. Add option for supplying a local database.
+---
+ spectre-meltdown-checker.sh | 180 +++---------------------------------
+ 1 file changed, 15 insertions(+), 165 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 30f760c..ce46970 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -22,8 +22,6 @@ exit_cleanup()
+ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm -f "$dumped_config"
+ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm -f "$kerneltmp"
+ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm -f "$kerneltmp2"
+- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm -f "$mcedb_tmp"
+- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm -rf "$intel_tmp"
+ [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug 2>/dev/null
+ [ "${mounted_procfs:-}" = 1 ] && umount "$procfs" 2>/dev/null
+ [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
+@@ -93,9 +91,7 @@ show_usage()
+ --vmm [auto,yes,no] override the detection of the presence of a hypervisor, default: auto
+ --allow-msr-write allow probing for write-only MSRs, this might produce kernel logs or be blocked by your system
+ --cpu [#,all] interact with CPUID and MSR of CPU core number #, or all (default: CPU core 0)
+- --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome
+- MCExtractor project and the Intel firmwares GitHub repository)
+- --update-builtin-fwdb same as --update-fwdb but update builtin DB inside the script itself
++ --with-fwdb FILE supply the CPU microcodes versions database
+ --dump-mock-data used to mimick a CPU on an other system, mainly used to help debugging this script
+
+ Return codes:
+@@ -837,147 +833,6 @@ show_header()
+ _info
+ }
+
+-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
+-mcedb_cache="$HOME/.mcedb"
+-update_fwdb()
+-{
+- show_header
+-
+- set -e
+-
+- if [ -r "$mcedb_cache" ]; then
+- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+- fi
+-
+- # first, download the MCE.db from the excellent platomav's MCExtractor project
+- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
+- mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+- _info_nol "Fetching MCE.db from the MCExtractor project... "
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
+- curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+- elif command -v fetch >/dev/null 2>&1; then
+- fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+- else
+- echo ERROR "please install one of \`wget\`, \`curl\` of \`fetch\` programs"
+- return 1
+- fi
+- if [ "$ret" != 0 ]; then
+- echo ERROR "error $ret while downloading MCE.db"
+- return $ret
+- fi
+- echo DONE
+-
+- # second, get the Intel firmwares from GitHub
+- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
+- intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+- _info_nol "Fetching Intel firmwares... "
+- ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
+- curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+- elif command -v fetch >/dev/null 2>&1; then
+- fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+- else
+- echo ERROR "please install one of \`wget\`, \`curl\` of \`fetch\` programs"
+- return 1
+- fi
+- if [ "$ret" != 0 ]; then
+- echo ERROR "error $ret while downloading Intel firmwares"
+- return $ret
+- fi
+- echo DONE
+-
+- # now extract MCEdb contents using sqlite
+- _info_nol "Extracting MCEdb data... "
+- if ! command -v sqlite3 >/dev/null 2>&1; then
+- echo ERROR "please install the \`sqlite3\` program"
+- return 1
+- fi
+- mcedb_revision=$(sqlite3 "$mcedb_tmp" "select revision from MCE")
+- if [ -z "$mcedb_revision" ]; then
+- echo ERROR "downloaded file seems invalid"
+- return 1
+- fi
+- sqlite3 "$mcedb_tmp" "alter table Intel add column origin text"
+- sqlite3 "$mcedb_tmp" "update Intel set origin='mce'"
+-
+- echo OK "MCExtractor database revision $mcedb_revision"
+-
+- # parse Intel firmwares to get their versions
+- _info_nol "Integrating Intel firmwares data to db... "
+- if ! command -v unzip >/dev/null 2>&1; then
+- echo ERROR "please install the \`unzip\` program"
+- return 1
+- fi
+- ( cd "$intel_tmp" && unzip fw.zip >/dev/null; )
+- if ! [ -d "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" ]; then
+- echo ERROR "expected the 'intel-ucode' folder in the downloaded zip file"
+- return 1
+- fi
+-
+- if ! command -v iucode_tool >/dev/null 2>&1; then
+- if ! command -v iucode-tool >/dev/null 2>&1; then
+- echo ERROR "please install the \`iucode-tool\` program"
+- return 1
+- else
+- iucode_tool="iucode-tool"
+- fi
+- else
+- iucode_tool="iucode_tool"
+- fi
+- # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev 0x0217, size 5120
+- # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev 0x0107, size 5120
+- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
+- do
+- _line=$( echo "$_line" | tr -d ',')
+- _cpuid=$( echo "$_line" | awk '{print $3}')
+- _cpuid=$(( _cpuid ))
+- _cpuid=$(printf "0x%08X" "$_cpuid")
+- _date=$( echo "$_line" | awk '{print $6}' | tr -d '-')
+- _version=$(echo "$_line" | awk '{print $8}')
+- _version=$(( _version ))
+- _version=$(printf "0x%08X" "$_version")
+- _sqlstm="$(printf "INSERT INTO Intel (origin,cpuid,version,yyyymmdd) VALUES (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")" "$(printf "%08X" "$_version")" "$_date")"
+- sqlite3 "$mcedb_tmp" "$_sqlstm"
+- done
+- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
+- if [ -n "$_intel_timestamp" ]; then
+- # use this date, it matches the last commit date
+- _intel_latest_date=$(date +%Y%m%d -d @"$_intel_timestamp")
+- else
+- echo "Falling back to the latest microcode date"
+- _intel_latest_date=$(sqlite3 "$mcedb_tmp" "SELECT yyyymmdd from Intel WHERE origin = 'intel' ORDER BY yyyymmdd DESC LIMIT 1;")
+- fi
+- echo DONE "(version $_intel_latest_date)"
+-
+- dbversion="$mcedb_revision+i$_intel_latest_date"
+-
+- if [ "$1" != builtin ] && [ -n "$previous_dbversion" ] && [ "$previous_dbversion" = "v$dbversion" ]; then
+- echo "We already have this version locally, no update needed"
+- return 0
+- fi
+-
+- _info_nol "Building local database... "
+- {
+- echo "# Spectre & Meltdown Checker";
+- echo "# %%% MCEDB v$dbversion";
+- sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- } > "$mcedb_cache"
+- echo DONE "(version $dbversion)"
+-
+- if [ "$1" = builtin ]; then
+- newfile=$(mktemp -t smc-builtin-XXXXXX)
+- awk '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- awk '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- cat "$newfile" > "$0"
+- rm -f "$newfile"
+- fi
+-}
+-
+ parse_opt_file()
+ {
+ # parse_opt_file option_name option_value
+@@ -1067,12 +922,15 @@ while [ -n "${1:-}" ]; do
+ # deprecated, kept for compatibility
+ opt_explain=0
+ shift
+- elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb" ]; then
+- update_fwdb
+- exit $?
+- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--update-builtin-mcedb" ]; then
+- update_fwdb builtin
+- exit $?
++ elif [ "$1" = "--with-fwdb" ] || [ "$1" = "--with-mcedb" ]; then
++ opt_fwdb=$2
++ if [ -f "$opt_fwdb" ]; then
++ mcedb_cache=$2
++ else
++ echo "$0: error: --with-fwdb should be a file, got '$opt_fwdb'" >&2
++ exit 255
++ fi
++ shift 2
+ elif [ "$1" = "--dump-mock-data" ]; then
+ opt_mock=1
+ shift
+@@ -2033,21 +1891,11 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+ local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+- # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | sort -V | head -n1)
+- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+- mcedb_source="$mcedb_cache"
+- mcedb_info="local firmwares DB $local_dbversion"
+- fi
+-fi
+-# if mcedb_source is not set, either we don't have a local cached db, or it is older than the builtin db
+-if [ -z "${mcedb_source:-}" ]; then
+- mcedb_source="$0"
+- mcedb_info="builtin firmwares DB $builtin_dbversion"
++ mcedb_source="$mcedb_cache"
++ mcedb_info="local firmwares DB $local_dbversion"
+ fi
+ read_mcedb()
+ {
+@@ -2063,7 +1911,9 @@ is_latest_known_ucode()
+ return 2
+ fi
+ ucode_latest="latest microcode version for your CPU model is unknown"
+- if is_intel; then
++ if [ -z "$mcedb_source" ]; then
++ return 2
++ elif is_intel; then
+ cpu_brand_prefix=I
+ elif is_amd; then
+ cpu_brand_prefix=A
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
new file mode 100644
index 0000000000..a8e7531f32
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-substitution.patch
@@ -0,0 +1,1849 @@
+From 1d79c223d5dc114f63da2c5061d2c713d8a05687 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Fri, 11 Nov 2022 18:49:50 +0800
+Subject: [PATCH 2/2] Stage commands for later substitution.
+
+awk, base64, basename, bunzip2, cat, cut, dd, dirname, dmesg, find, grep,
+gunzip, gzip, head, id, lz4, lzop, mktemp, modprobe, mount, nm, nproc,
+objdump, od, perl, pgrep, readelf, rm, rmmod, sed, sort, stat, strings,
+sysctl, tr, umount, uname, unlzma, unxz, unzstd, uuencode, xargs.
+---
+ spectre-meltdown-checker.sh | 606 ++++++++++++++++++------------------
+ 1 file changed, 303 insertions(+), 303 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index ce46970..4889ebb 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -19,31 +19,31 @@ trap '_warn "interrupted, cleaning up..."; exit_cleanup; exit 1' INT
+ exit_cleanup()
+ {
+ # cleanup the temp decompressed config & kernel image
+- [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm -f "$dumped_config"
+- [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm -f "$kerneltmp"
+- [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm -f "$kerneltmp2"
+- [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug 2>/dev/null
+- [ "${mounted_procfs:-}" = 1 ] && umount "$procfs" 2>/dev/null
+- [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
+- [ "${insmod_msr:-}" = 1 ] && rmmod msr 2>/dev/null
++ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && @rm@ -f "$dumped_config"
++ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && @rm@ -f "$kerneltmp"
++ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && @rm@ -f "$kerneltmp2"
++ [ "${mounted_debugfs:-}" = 1 ] && @umount@ /sys/kernel/debug 2>/dev/null
++ [ "${mounted_procfs:-}" = 1 ] && @umount@ "$procfs" 2>/dev/null
++ [ "${insmod_cpuid:-}" = 1 ] && @rmmod@ cpuid 2>/dev/null
++ [ "${insmod_msr:-}" = 1 ] && @rmmod@ msr 2>/dev/null
+ [ "${kldload_cpuctl:-}" = 1 ] && kldunload cpuctl 2>/dev/null
+ [ "${kldload_vmm:-}" = 1 ] && kldunload vmm 2>/dev/null
+ }
+
+ # if we were git clone'd, adjust VERSION
+-if [ -d "$(dirname "$0")/.git" ] && command -v git >/dev/null 2>&1; then
+- describe=$(git -C "$(dirname "$0")" describe --tags --dirty 2>/dev/null)
+- [ -n "$describe" ] && VERSION=$(echo "$describe" | sed -e s/^v//)
++if [ -d "$(@dirname@ "$0")/.git" ] && command -v git >/dev/null 2>&1; then
++ describe=$(git -C "$(@dirname@ "$0")" describe --tags --dirty 2>/dev/null)
++ [ -n "$describe" ] && VERSION=$(echo "$describe" | @sed@ -e s/^v//)
+ fi
+
+ show_usage()
+ {
+ # shellcheck disable=SC2086
+- cat <<EOF
++ @cat@ <<EOF
+ Usage:
+- Live mode (auto): $(basename $0) [options]
+- Live mode (manual): $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
+- Offline mode: $(basename $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
++ Live mode (auto): $(@basename@ $0) [options]
++ Live mode (manual): $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
++ Offline mode: $(@basename@ $0) [options] <[--kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
+
+ Modes:
+ Two modes are available.
+@@ -106,7 +106,7 @@ EOF
+
+ show_disclaimer()
+ {
+- cat <<EOF
++ @cat@ <<EOF
+ Disclaimer:
+
+ This tool does its best to determine whether your system is immune (or has proper mitigations in place) for the
+@@ -134,7 +134,7 @@ This tool has been released in the hope that it'll be useful, but don't use it t
+ EOF
+ }
+
+-os=$(uname -s)
++os=$(@uname@ -s)
+
+ # parse options
+ opt_kernel=''
+@@ -203,7 +203,7 @@ __echo()
+ _interpret_chars='-e'
+ fi
+ _ctrlchar=$($echo_cmd $_interpret_chars "\033")
+- _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
++ _msg=$($echo_cmd $_interpret_chars "$_msg" | @sed@ -r "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
+ fi
+ if [ "$echo_cmd_type" = printf ]; then
+ if [ "$opt" = "-n" ]; then
+@@ -379,7 +379,7 @@ is_cpu_affected()
+ # https://github.com/crozone/SpectrePoC/issues/1 ^F E5200 => spectre 2 not affected
+ # https://github.com/paboldin/meltdown-exploit/issues/19 ^F E5200 => meltdown affected
+ # model name : Pentium(R) Dual-Core CPU E5200 @ 2.50GHz
+- if echo "$cpu_friendly_name" | grep -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
++ if echo "$cpu_friendly_name" | @grep@ -qE 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ variant3=vuln
+@@ -482,7 +482,7 @@ is_cpu_affected()
+ i=$(( i + 1 ))
+ # do NOT quote $cpu_arch_list below
+ # shellcheck disable=SC2086
+- cpuarch=$(echo $cpu_arch_list | awk '{ print $'$i' }')
++ cpuarch=$(echo $cpu_arch_list | @awk@ '{ print $'$i' }')
+ _debug "checking cpu$i: <$cpupart> <$cpuarch>"
+ # some kernels report AArch64 instead of 8
+ [ "$cpuarch" = "AArch64" ] && cpuarch=8
+@@ -493,49 +493,49 @@ is_cpu_affected()
+ # part ? ? c08 c09 c0d c0f c0e d07 d08 d09 d0a d0b d0c d0d
+ # arch 7? 7? 7 7 7 7 7 8 8 8 8 8 8 8
+ #
+- # Whitelist identified non-affected processors, use vulnerability information from
++ # Whitelist identified non-affected processors, use vulnerability information from
+ # https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
+ # Partnumbers can be found here:
+ # https://github.com/gcc-mirror/gcc/blob/master/gcc/config/arm/arm-cpus.in
+ #
+ # Maintain cumulative check of vulnerabilities -
+ # if at least one of the cpu is affected, then the system is affected
+- if [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
++ if [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A8/A9/A12/A17 non affected to variants 3, 3a & 4"
+- elif [ "$cpuarch" = 7 ] && echo "$cpupart" | grep -q -w -e 0xc0f; then
++ elif [ "$cpuarch" = 7 ] && echo "$cpupart" | @grep@ -q -w -e 0xc0f; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ [ -z "$variant4" ] && variant4=immune
+ _debug "checking cpu$i: armv7 A15 non affected to variants 3 & 4"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd07 -e 0xd08; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd07 -e 0xd08; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ variant3a=vuln
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A57/A72 non affected to variants 3"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd09; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd09; then
+ variant1=vuln
+ variant2=vuln
+ [ -z "$variant3" ] && variant3=immune
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A73 non affected to variants 3 & 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0a; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0a; then
+ variant1=vuln
+ variant2=vuln
+ variant3=vuln
+ [ -z "$variant3a" ] && variant3a=immune
+ variant4=vuln
+ _debug "checking cpu$i: armv8 A75 non affected to variant 3a"
+- elif [ "$cpuarch" = 8 ] && echo "$cpupart" | grep -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
++ elif [ "$cpuarch" = 8 ] && echo "$cpupart" | @grep@ -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
+ variant1=vuln
+ [ -z "$variant2" ] && variant2=immune
+ [ -z "$variant3" ] && variant3=immune
+@@ -816,7 +816,7 @@ is_cpu_ssb_free()
+ if [ "$cpu_family" = "18" ] || \
+ [ "$cpu_family" = "17" ] || \
+ [ "$cpu_family" = "16" ] || \
+- [ "$cpu_family" = "15" ]; then
++ [ "$cpu_family" = "15" ]; then
+ return 0
+ fi
+ fi
+@@ -910,7 +910,7 @@ while [ -n "${1:-}" ]; do
+ elif [ "$1" = "--cpu" ]; then
+ opt_cpu=$2
+ if [ "$opt_cpu" != all ]; then
+- if echo "$opt_cpu" | grep -Eq '^[0-9]+'; then
++ if echo "$opt_cpu" | @grep@ -Eq '^[0-9]+'; then
+ opt_cpu=$(( opt_cpu ))
+ else
+ echo "$0: error: --cpu should be an integer or 'all', got '$opt_cpu'" >&2
+@@ -961,7 +961,7 @@ while [ -n "${1:-}" ]; do
+ echo "$0: error: option --cve expects a parameter, supported CVEs are: $supported_cve_list" >&2
+ exit 255
+ fi
+- selected_cve=$(echo "$supported_cve_list" | grep -iwo "$2")
++ selected_cve=$(echo "$supported_cve_list" | @grep@ -iwo "$2")
+ if [ -n "$selected_cve" ]; then
+ opt_cve_list="$opt_cve_list $selected_cve"
+ opt_cve_all=0
+@@ -1166,14 +1166,14 @@ check_kernel()
+ # a damaged ELF file and validate it, check for stderr warnings too
+
+ # the warning "readelf: Warning: [16]: Link field (0) should index a symtab section./" can appear on valid kernels, ignore it
+- _readelf_warnings=$("${opt_arch_prefix}readelf" -S "$_file" 2>&1 >/dev/null | grep -v 'should index a symtab section' | tr "\n" "/"); ret=$?
+- _readelf_sections=$("${opt_arch_prefix}readelf" -S "$_file" 2>/dev/null | grep -c -e data -e text -e init)
+- _kernel_size=$(stat -c %s "$_file" 2>/dev/null || stat -f %z "$_file" 2>/dev/null || echo 10000)
++ _readelf_warnings=$("@readelf@" -S "$_file" 2>&1 >/dev/null | @grep@ -v 'should index a symtab section' | @tr@ "\n" "/"); ret=$?
++ _readelf_sections=$("@readelf@" -S "$_file" 2>/dev/null | @grep@ -c -e data -e text -e init)
++ _kernel_size=$(@stat@ -c %s "$_file" 2>/dev/null || @stat@ -f %z "$_file" 2>/dev/null || echo 10000)
+ _debug "check_kernel: ret=$? size=$_kernel_size sections=$_readelf_sections warnings=$_readelf_warnings"
+ if [ "$_mode" = desperate ]; then
+- if "${opt_arch_prefix}strings" "$_file" | grep -Eq '^Linux version '; then
++ if "@strings@" "$_file" | @grep@ -Eq '^Linux version '; then
+ _debug "check_kernel (desperate): ... matched!"
+- if [ "$_readelf_sections" = 0 ] && grep -qF -e armv6 -e armv7 "$_file"; then
++ if [ "$_readelf_sections" = 0 ] && @grep@ -qF -e armv6 -e armv7 "$_file"; then
+ _debug "check_kernel (desperate): raw arm binary found, adjusting objdump options"
+ objdump_options="-D -b binary -marm"
+ else
+@@ -1206,7 +1206,7 @@ try_decompress()
+
+ # Try to find the header ($1) and decompress from here
+ _debug "try_decompress: looking for $3 magic in $6"
+- for pos in $(tr "$1\n$2" "\n$2=" < "$6" | grep -abo "^$2")
++ for pos in $(@tr@ "$1\n$2" "\n$2=" < "$6" | @grep@ -abo "^$2")
+ do
+ _debug "try_decompress: magic for $3 found at offset $pos"
+ if ! command -v "$3" >/dev/null 2>&1; then
+@@ -1233,11 +1233,11 @@ try_decompress()
+ kernel="$kerneltmp"
+ _debug "try_decompress: decompressed with $3 successfully!"
+ return 0
+- elif [ "$3" != "cat" ]; then
++ elif [ "$3" != "@cat@" ]; then
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel, trying with an offset"
+- [ -z "$kerneltmp2" ] && kerneltmp2=$(mktemp -t smc-kernel-XXXXXX)
+- cat "$kerneltmp" > "$kerneltmp2"
+- try_decompress '\177ELF' xxy 'cat' '' cat "$kerneltmp2" && return 0
++ [ -z "$kerneltmp2" ] && kerneltmp2=$(@mktemp@ -t smc-kernel-XXXXXX)
++ @cat@ "$kerneltmp" > "$kerneltmp2"
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$kerneltmp2" && return 0
+ else
+ _debug "try_decompress: decompression with $3 worked but result is not a kernel"
+ fi
+@@ -1249,12 +1249,12 @@ extract_kernel()
+ {
+ [ -n "${1:-}" ] || return 1
+ # Prepare temp files:
+- kerneltmp="$(mktemp -t smc-kernel-XXXXXX)"
++ kerneltmp="$(@mktemp@ -t smc-kernel-XXXXXX)"
+
+ # Initial attempt for uncompressed images or objects:
+ if check_kernel "$1"; then
+ _debug "extract_kernel: found kernel is valid, no decompression needed"
+- cat "$1" > "$kerneltmp"
++ @cat@ "$1" > "$kerneltmp"
+ kernel=$kerneltmp
+ return 0
+ fi
+@@ -1263,14 +1263,14 @@ extract_kernel()
+ for pass in 1 2; do
+ for mode in normal desperate; do
+ _debug "extract_kernel: pass $pass $mode mode"
+- try_decompress '\037\213\010' xy gunzip '' gunzip "$1" "$mode" "$pass" && return 0
+- try_decompress '\002\041\114\030' xyy 'lz4' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
+- try_decompress '\3757zXZ\000' abcde unxz '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress 'BZh' xy bunzip2 '' bzip2 "$1" "$mode" "$pass" && return 0
+- try_decompress '\135\0\0\0' xxx unlzma '' xz-utils "$1" "$mode" "$pass" && return 0
+- try_decompress '\211\114\132' xy 'lzop' '-d' lzop "$1" "$mode" "$pass" && return 0
+- try_decompress '\177ELF' xxy 'cat' '' cat "$1" "$mode" "$pass" && return 0
+- try_decompress '(\265/\375' xxy unzstd '' zstd "$1" "$mode" "$pass" && return 0
++ try_decompress '\037\213\010' xy @gunzip@ '' gunzip "$1" "$mode" "$pass" && return 0
++ try_decompress '\002\041\114\030' xyy '@lz4@' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
++ try_decompress '\3757zXZ\000' abcde @unxz@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress 'BZh' xy @bunzip2@ '' bzip2 "$1" "$mode" "$pass" && return 0
++ try_decompress '\135\0\0\0' xxx @unlzma@ '' xz-utils "$1" "$mode" "$pass" && return 0
++ try_decompress '\211\114\132' xy '@lzop@' '-d' lzop "$1" "$mode" "$pass" && return 0
++ try_decompress '\177ELF' xxy '@cat@' '' cat "$1" "$mode" "$pass" && return 0
++ try_decompress '(\265/\375' xxy @unzstd@ '' zstd "$1" "$mode" "$pass" && return 0
+ done
+ done
+ # kernel_err might already have been populated by try_decompress() if we're missing one of the tools
+@@ -1287,7 +1287,7 @@ mount_debugfs()
+ {
+ if [ ! -e /sys/kernel/debug/sched_features ]; then
+ # try to mount the debugfs hierarchy ourselves and remember it to umount afterwards
+- mount -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
++ @mount@ -t debugfs debugfs /sys/kernel/debug 2>/dev/null && mounted_debugfs=1
+ fi
+ }
+
+@@ -1298,12 +1298,12 @@ load_msr()
+ load_msr_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw msr "$procfs/modules" 2>/dev/null; then
+- modprobe msr 2>/dev/null && insmod_msr=1
++ if ! @grep@ -qw msr "$procfs/modules" 2>/dev/null; then
++ @modprobe@ msr 2>/dev/null && insmod_msr=1
+ _debug "attempted to load module msr, insmod_msr=$insmod_msr"
+ else
+ _debug "msr module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1321,12 +1321,12 @@ load_cpuid()
+ load_cpuid_once=1
+
+ if [ "$os" = Linux ]; then
+- if ! grep -qw cpuid "$procfs/modules" 2>/dev/null; then
+- modprobe cpuid 2>/dev/null && insmod_cpuid=1
++ if ! @grep@ -qw cpuid "$procfs/modules" 2>/dev/null; then
++ @modprobe@ cpuid 2>/dev/null && insmod_cpuid=1
+ _debug "attempted to load module cpuid, insmod_cpuid=$insmod_cpuid"
+ else
+ _debug "cpuid module already loaded"
+- fi
++ fi
+ else
+ if ! kldstat -q -m cpuctl; then
+ kldload cpuctl 2>/dev/null && kldload_cpuctl=1
+@@ -1415,7 +1415,7 @@ read_cpuid_one_core()
+ fi
+ # on some kernel versions, /dev/cpu/0/cpuid doesn't imply that the cpuid module is loaded, in that case dd returns an error,
+ # we use that fact to load the module if dd returns an error
+- if ! dd if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
++ if ! @dd@ if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null 2>&1; then
+ load_cpuid
+ fi
+ # we need _leaf to be converted to decimal for dd
+@@ -1426,14 +1426,14 @@ read_cpuid_one_core()
+ _ddskip=$(( _position / 16 ))
+ _odskip=$(( _position - _ddskip * 16 ))
+ # now read the value
+- _cpuid=$(dd if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | od -j $((_odskip * 16)) -A n -t u4)
++ _cpuid=$(@dd@ if="/dev/cpu/$_core/cpuid" bs=16 skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | @od@ -j $((_odskip * 16)) -A n -t u4)
+ elif [ -e /dev/cpuctl0 ]; then
+ # BSD
+ if [ ! -r /dev/cpuctl0 ]; then
+ read_cpuid_msg="Couldn't read cpuid info from cpuctl"
+ return $READ_CPUID_RET_ERR
+ fi
+- _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | cut -d: -f2-)
++ _cpuid=$(cpucontrol -i "$_leaf","$_subleaf" "/dev/cpuctl$_core" 2>/dev/null | @cut@ -d: -f2-)
+ # cpuid level 0x4, level_type 0x2: 0x1c004143 0x01c0003f 0x000001ff 0x00000000
+ else
+ read_cpuid_msg="Found no way to read cpuid info"
+@@ -1456,7 +1456,7 @@ read_cpuid_one_core()
+ fi
+
+ # get the value of the register we want
+- _reg=$(echo "$_cpuid" | awk '{print $'"$_register"'}')
++ _reg=$(echo "$_cpuid" | @awk@ '{print $'"$_register"'}')
+ # Linux returns it as decimal, BSD as hex, normalize to decimal
+ _reg=$(( _reg ))
+ # shellcheck disable=SC2046
+@@ -1484,11 +1484,11 @@ dmesg_grep()
+ # grep for something in dmesg, ensuring that the dmesg buffer
+ # has not been truncated
+ dmesg_grepped=''
+- if ! dmesg | grep -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
++ if ! @dmesg@ | @grep@ -qE -e '(^|\] )Linux version [0-9]' -e '^FreeBSD is a registered' ; then
+ # dmesg truncated
+ return 2
+ fi
+- dmesg_grepped=$(dmesg | grep -E "$1" | head -1)
++ dmesg_grepped=$(@dmesg@ | @grep@ -E "$1" | @head@ -1)
+ # not found:
+ [ -z "$dmesg_grepped" ] && return 1
+ # found, output is in $dmesg_grepped
+@@ -1505,12 +1505,12 @@ parse_cpu_details()
+ {
+ [ "${parse_cpu_details_done:-}" = 1 ] && return 0
+
+- if command -v nproc >/dev/null; then
+- number_of_cores=$(nproc)
+- elif echo "$os" | grep -q BSD; then
+- number_of_cores=$(sysctl -n hw.ncpu 2>/dev/null || echo 1)
++ if command -v @nproc@ >/dev/null; then
++ number_of_cores=$(@nproc@)
++ elif echo "$os" | @grep@ -q BSD; then
++ number_of_cores=$(@sysctl@ -n hw.ncpu 2>/dev/null || echo 1)
+ elif [ -e "$procfs/cpuinfo" ]; then
+- number_of_cores=$(grep -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
++ number_of_cores=$(@grep@ -c ^processor "$procfs/cpuinfo" 2>/dev/null || echo 1)
+ else
+ # if we don't know, default to 1 CPU
+ number_of_cores=1
+@@ -1518,43 +1518,43 @@ parse_cpu_details()
+ max_core_id=$(( number_of_cores - 1 ))
+
+ if [ -e "$procfs/cpuinfo" ]; then
+- cpu_vendor=$( grep '^vendor_id' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
+- cpu_friendly_name=$(grep '^model name' "$procfs/cpuinfo" | cut -d: -f2- | head -1 | sed -e 's/^ *//')
++ cpu_vendor=$( @grep@ '^vendor_id' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
++ cpu_friendly_name=$(@grep@ '^model name' "$procfs/cpuinfo" | @cut@ -d: -f2- | @head@ -1 | @sed@ -e 's/^ *//')
+ # special case for ARM follows
+- if grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
++ if @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
+ cpu_vendor='ARM'
+ # some devices (phones or other) have several ARMs and as such different part numbers,
+ # an example is "bigLITTLE", so we need to store the whole list, this is needed for is_cpu_affected
+- cpu_part_list=$(awk '/CPU part/ {print $4}' "$procfs/cpuinfo")
+- cpu_arch_list=$(awk '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
++ cpu_part_list=$(@awk@ '/CPU part/ {print $4}' "$procfs/cpuinfo")
++ cpu_arch_list=$(@awk@ '/CPU architecture/ {print $3}' "$procfs/cpuinfo")
+ # take the first one to fill the friendly name, do NOT quote the vars below
+ # shellcheck disable=SC2086
+- cpu_arch=$(echo $cpu_arch_list | awk '{ print $1 }')
++ cpu_arch=$(echo $cpu_arch_list | @awk@ '{ print $1 }')
+ # shellcheck disable=SC2086
+- cpu_part=$(echo $cpu_part_list | awk '{ print $1 }')
++ cpu_part=$(echo $cpu_part_list | @awk@ '{ print $1 }')
+ [ "$cpu_arch" = "AArch64" ] && cpu_arch=8
+ cpu_friendly_name="ARM"
+ [ -n "$cpu_arch" ] && cpu_friendly_name="$cpu_friendly_name v$cpu_arch"
+ [ -n "$cpu_part" ] && cpu_friendly_name="$cpu_friendly_name model $cpu_part"
+
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
+ cpu_vendor='CAVIUM'
+- elif grep -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
++ elif @grep@ -qi 'CPU implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
+ cpu_vendor='PHYTIUM'
+ fi
+
+- cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" | awk '{print $4}' | grep -E '^[0-9]+$' | head -1)
+- cpu_model=$( grep '^model' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_stepping=$(grep '^stepping' "$procfs/cpuinfo" | awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
+- cpu_ucode=$( grep '^microcode' "$procfs/cpuinfo" | awk '{print $3}' | head -1)
++ cpu_family=$( @grep@ '^cpu family' "$procfs/cpuinfo" | @awk@ '{print $4}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_model=$( @grep@ '^model' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_stepping=$(@grep@ '^stepping' "$procfs/cpuinfo" | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
++ cpu_ucode=$( @grep@ '^microcode' "$procfs/cpuinfo" | @awk@ '{print $3}' | @head@ -1)
+ else
+- cpu_vendor=$( dmesg | grep -i -m1 'Origin=' | cut -f2 -w | cut -f2 -d= | cut -f2 -d\" )
+- cpu_family=$( dmesg | grep -i -m1 'Family=' | cut -f4 -w | cut -f2 -d= )
++ cpu_vendor=$( @dmesg@ | @grep@ -i -m1 'Origin=' | @cut@ -f2 -w | @cut@ -f2 -d= | @cut@ -f2 -d\" )
++ cpu_family=$( @dmesg@ | @grep@ -i -m1 'Family=' | @cut@ -f4 -w | @cut@ -f2 -d= )
+ cpu_family=$(( cpu_family ))
+- cpu_model=$( dmesg | grep -i -m1 'Model=' | cut -f5 -w | cut -f2 -d= )
++ cpu_model=$( @dmesg@ | @grep@ -i -m1 'Model=' | @cut@ -f5 -w | @cut@ -f2 -d= )
+ cpu_model=$(( cpu_model ))
+- cpu_stepping=$( dmesg | grep -i -m1 'Stepping=' | cut -f6 -w | cut -f2 -d= )
+- cpu_friendly_name=$(sysctl -n hw.model 2>/dev/null)
++ cpu_stepping=$( @dmesg@ | @grep@ -i -m1 'Stepping=' | @cut@ -f6 -w | @cut@ -f2 -d= )
++ cpu_friendly_name=$(@sysctl@ -n hw.model 2>/dev/null)
+ fi
+
+ if [ -n "${SMC_MOCK_CPU_FRIENDLY_NAME:-}" ]; then
+@@ -1609,7 +1609,7 @@ parse_cpu_details()
+ # call CPUID
+ cpucontrol -i 1 /dev/cpuctl0 >/dev/null
+ # read MSR
+- cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | awk '{print $3}')
++ cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 | @awk@ '{print $3}')
+ # convert to decimal
+ cpu_ucode=$(( cpu_ucode ))
+ # convert back to hex
+@@ -1628,7 +1628,7 @@ parse_cpu_details()
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CPU_UCODE='$cpu_ucode'")
+ fi
+
+- echo "$cpu_ucode" | grep -q ^0x && cpu_ucode=$(( cpu_ucode ))
++ echo "$cpu_ucode" | @grep@ -q ^0x && cpu_ucode=$(( cpu_ucode ))
+ ucode_found=$(printf "family 0x%x model 0x%x stepping 0x%x ucode 0x%x cpuid 0x%x" "$cpu_family" "$cpu_model" "$cpu_stepping" "$cpu_ucode" "$cpu_cpuid")
+
+ # also define those that we will need in other funcs
+@@ -1725,8 +1725,8 @@ is_cpu_smt_enabled()
+ {
+ # SMT / HyperThreading is enabled if siblings != cpucores
+ if [ -e "$procfs/cpuinfo" ]; then
+- _siblings=$(awk '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
+- _cpucores=$(awk '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
++ _siblings=$(@awk@ '/^siblings/ {print $3;exit}' "$procfs/cpuinfo")
++ _cpucores=$(@awk@ '/^cpu cores/ {print $4;exit}' "$procfs/cpuinfo")
+ if [ -n "$_siblings" ] && [ -n "$_cpucores" ]; then
+ if [ "$_siblings" = "$_cpucores" ]; then
+ return 1
+@@ -1774,10 +1774,10 @@ is_ucode_blacklisted()
+ $INTEL_FAM6_SANDYBRIDGE_X,0x06,0x61b \
+ $INTEL_FAM6_SANDYBRIDGE_X,0x07,0x712
+ do
+- model=$(echo "$tuple" | cut -d, -f1)
+- stepping=$(( $(echo "$tuple" | cut -d, -f2) ))
++ model=$(echo "$tuple" | @cut@ -d, -f1)
++ stepping=$(( $(echo "$tuple" | @cut@ -d, -f2) ))
+ if [ "$cpu_model" = "$model" ] && [ "$cpu_stepping" = "$stepping" ]; then
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
+ if [ "$cpu_ucode" = "$ucode" ]; then
+ _debug "is_ucode_blacklisted: we have a match! ($cpu_model/$cpu_stepping/$cpu_ucode)"
+ return 0
+@@ -1865,7 +1865,7 @@ is_xen_dom0()
+ return 1
+ fi
+
+- if [ -e "$procfs/xen/capabilities" ] && grep -q "control_d" "$procfs/xen/capabilities"; then
++ if [ -e "$procfs/xen/capabilities" ] && @grep@ -q "control_d" "$procfs/xen/capabilities"; then
+ return 0
+ else
+ return 1
+@@ -1893,13 +1893,13 @@ is_xen_domU()
+
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+- local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
++ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+ mcedb_source="$mcedb_cache"
+ mcedb_info="local firmwares DB $local_dbversion"
+ fi
+ read_mcedb()
+ {
+- awk '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
++ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1 }' "$mcedb_source"
+ }
+
+ is_latest_known_ucode()
+@@ -1920,10 +1920,10 @@ is_latest_known_ucode()
+ else
+ return 2
+ fi
+- for tuple in $(read_mcedb | grep "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
++ for tuple in $(read_mcedb | @grep@ "$(printf "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
+ do
+- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
+- ucode_date=$(echo "$tuple" | cut -d, -f4 | sed -r 's=(....)(..)(..)=\1/\2/\3=')
++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
++ ucode_date=$(echo "$tuple" | @cut@ -d, -f4 | @sed@ -r 's=(....)(..)(..)=\1/\2/\3=')
+ _debug "is_latest_known_ucode: with cpuid $cpu_cpuid has ucode $cpu_ucode, last known is $ucode from $ucode_date"
+ ucode_latest=$(printf "latest version is 0x%x dated $ucode_date according to $mcedb_info" "$ucode")
+ if [ "$cpu_ucode" -ge "$ucode" ]; then
+@@ -1948,7 +1948,7 @@ get_cmdline()
+ kernel_cmdline="$SMC_MOCK_CMDLINE"
+ return
+ else
+- kernel_cmdline=$(cat "$procfs/cmdline")
++ kernel_cmdline=$(@cat@ "$procfs/cmdline")
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_CMDLINE='$kernel_cmdline'")
+ fi
+ }
+@@ -1956,7 +1956,7 @@ get_cmdline()
+ # ENTRYPOINT
+
+ # we can't do anything useful under WSL
+-if uname -a | grep -qE -- '-Microsoft #[0-9]+-Microsoft '; then
++if @uname@ -a | @grep@ -qE -- '-Microsoft #[0-9]+-Microsoft '; then
+ _warn "This script doesn't work under Windows Subsystem for Linux"
+ _warn "You should use the official Microsoft tool instead."
+ _warn "It can be found under https://aka.ms/SpeculationControlPS"
+@@ -2005,15 +2005,15 @@ fi
+
+ # if we're under a BSD, try to mount linprocfs for "$procfs/cpuinfo"
+ procfs=/proc
+-if echo "$os" | grep -q BSD; then
++if echo "$os" | @grep@ -q BSD; then
+ _debug "We're under BSD, check if we have procfs"
+- procfs=$(mount | awk '/^linprocfs/ { print $3; exit; }')
++ procfs=$(@mount@ | @awk@ '/^linprocfs/ { print $3; exit; }')
+ if [ -z "$procfs" ]; then
+ _debug "we don't, try to mount it"
+ procfs=/proc
+ [ -d /compat/linux/proc ] && procfs=/compat/linux/proc
+ test -d $procfs || mkdir $procfs
+- if mount -t linprocfs linprocfs $procfs 2>/dev/null; then
++ if @mount@ -t linprocfs linprocfs $procfs 2>/dev/null; then
+ mounted_procfs=1
+ _debug "procfs just mounted at $procfs"
+ else
+@@ -2045,14 +2045,14 @@ fi
+
+ if [ "$opt_live" = 1 ]; then
+ # root check (only for live mode, for offline mode, we already checked if we could read the files)
+- if [ "$(id -u)" -ne 0 ]; then
++ if [ "$(@id@ -u)" -ne 0 ]; then
+ _warn "Note that you should launch this script with root privileges to get accurate information."
+ _warn "We'll proceed but you might see permission denied errors."
+ _warn "To run it as root, you can try the following command: sudo $0"
+ _warn
+ fi
+ _info "Checking for vulnerabilities on current system"
+- _info "Kernel is \033[35m$os $(uname -r) $(uname -v) $(uname -m)\033[0m"
++ _info "Kernel is \033[35m$os $(@uname@ -r) $(@uname@ -v) $(@uname@ -m)\033[0m"
+ _info "CPU is \033[35m$cpu_friendly_name\033[0m"
+
+ # try to find the image of the current running kernel
+@@ -2060,12 +2060,12 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ # first, look for the BOOT_IMAGE hint in the kernel cmdline
+- elif echo "$kernel_cmdline" | grep -q 'BOOT_IMAGE='; then
+- opt_kernel=$(echo "$kernel_cmdline" | grep -Eo 'BOOT_IMAGE=[^ ]+' | cut -d= -f2)
++ elif echo "$kernel_cmdline" | @grep@ -q 'BOOT_IMAGE='; then
++ opt_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo 'BOOT_IMAGE=[^ ]+' | @cut@ -d= -f2)
+ _debug "found opt_kernel=$opt_kernel in $procfs/cmdline"
+ # if the boot partition is within a btrfs subvolume, strip the subvolume name
+ # if /boot is a separate subvolume, the remainder of the code in this section should handle it
+- if echo "$opt_kernel" | grep -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | sed "s:/@[^/]*::"); fi
++ if echo "$opt_kernel" | @grep@ -q "^/@"; then opt_kernel=$(echo "$opt_kernel" | @sed@ "s:/@[^/]*::"); fi
+ # if we have a dedicated /boot partition, our bootloader might have just called it /
+ # so try to prepend /boot and see if we find anything
+ [ -e "/boot/$opt_kernel" ] && opt_kernel="/boot/$opt_kernel"
+@@ -2077,7 +2077,7 @@ if [ "$opt_live" = 1 ]; then
+ # if we didn't find a kernel, default to guessing
+ if [ ! -e "$opt_kernel" ]; then
+ # Fedora:
+- [ -e "/lib/modules/$(uname -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(uname -r)/vmlinuz"
++ [ -e "/lib/modules/$(@uname@ -r)/vmlinuz" ] && opt_kernel="/lib/modules/$(@uname@ -r)/vmlinuz"
+ # Slackware:
+ [ -e "/boot/vmlinuz" ] && opt_kernel="/boot/vmlinuz"
+ # Arch aarch64:
+@@ -2091,24 +2091,24 @@ if [ "$opt_live" = 1 ]; then
+ # pine64
+ [ -e "/boot/pine64/Image" ] && opt_kernel="/boot/pine64/Image"
+ # generic:
+- [ -e "/boot/vmlinuz-$(uname -r)" ] && opt_kernel="/boot/vmlinuz-$(uname -r)"
+- [ -e "/boot/kernel-$( uname -r)" ] && opt_kernel="/boot/kernel-$( uname -r)"
+- [ -e "/boot/bzImage-$(uname -r)" ] && opt_kernel="/boot/bzImage-$(uname -r)"
++ [ -e "/boot/vmlinuz-$(@uname@ -r)" ] && opt_kernel="/boot/vmlinuz-$(@uname@ -r)"
++ [ -e "/boot/kernel-$( @uname@ -r)" ] && opt_kernel="/boot/kernel-$( @uname@ -r)"
++ [ -e "/boot/bzImage-$(@uname@ -r)" ] && opt_kernel="/boot/bzImage-$(@uname@ -r)"
+ # Gentoo:
+- [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
++ [ -e "/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)" ] && opt_kernel="/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@ -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
+ # Guix System:
+ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+- [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
++ [ -e "/etc/machine-id" ] && [ -e "/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux" ] && opt_kernel="/boot/$(@cat@ /etc/machine-id)/$(@uname@ -r)/linux"
+ # Clear Linux:
+- str_uname=$(uname -r)
++ str_uname=$(@uname@ -r)
+ clear_linux_kernel="/lib/kernel/org.clearlinux.${str_uname##*.}.${str_uname%.*}"
+ [ -e "$clear_linux_kernel" ] && opt_kernel=$clear_linux_kernel
+ # Custom Arch seems to have the kernel path in its cmdline in the form "\directory\kernelimage",
+ # with actual \'s instead of /'s:
+- custom_arch_kernel=$(echo "$kernel_cmdline" | grep -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | tr "\\\\" "/" | tr -d '[:space:]')
++ custom_arch_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | @tr@ "\\\\" "/" | @tr@ -d '[:space:]')
+ if [ -n "$custom_arch_kernel" ] && [ -e "$custom_arch_kernel" ]; then
+ opt_kernel="$custom_arch_kernel"
+ fi
+@@ -2122,12 +2122,12 @@ if [ "$opt_live" = 1 ]; then
+ :
+ elif [ -e "$procfs/kallsyms" ] ; then
+ opt_map="$procfs/kallsyms"
+- elif [ -e "/lib/modules/$(uname -r)/System.map" ] ; then
+- opt_map="/lib/modules/$(uname -r)/System.map"
+- elif [ -e "/boot/System.map-$(uname -r)" ] ; then
+- opt_map="/boot/System.map-$(uname -r)"
+- elif [ -e "/lib/kernel/System.map-$(uname -r)" ]; then
+- opt_map="/lib/kernel/System.map-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/System.map" ] ; then
++ opt_map="/lib/modules/$(@uname@ -r)/System.map"
++ elif [ -e "/boot/System.map-$(@uname@ -r)" ] ; then
++ opt_map="/boot/System.map-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/System.map-$(@uname@ -r)" ]; then
++ opt_map="/lib/kernel/System.map-$(@uname@ -r)"
+ fi
+
+ # config
+@@ -2135,18 +2135,18 @@ if [ "$opt_live" = 1 ]; then
+ # specified by user on cmdline, with --live, don't override
+ :
+ elif [ -e "$procfs/config.gz" ] ; then
+- dumped_config="$(mktemp -t smc-config-XXXXXX)"
+- gunzip -c "$procfs/config.gz" > "$dumped_config"
++ dumped_config="$(@mktemp@ -t smc-config-XXXXXX)"
++ @gunzip@ -c "$procfs/config.gz" > "$dumped_config"
+ # dumped_config will be deleted at the end of the script
+ opt_config="$dumped_config"
+- elif [ -e "/lib/modules/$(uname -r)/config" ]; then
+- opt_config="/lib/modules/$(uname -r)/config"
+- elif [ -e "/boot/config-$(uname -r)" ]; then
+- opt_config="/boot/config-$(uname -r)"
+- elif [ -e "/etc/kernels/kernel-config-$(uname -m)-$(uname -r)" ]; then
+- opt_config="/etc/kernels/kernel-config-$(uname -m)-$(uname -r)"
+- elif [ -e "/lib/kernel/config-$(uname -r)" ]; then
+- opt_config="/lib/kernel/config-$(uname -r)"
++ elif [ -e "/lib/modules/$(@uname@ -r)/config" ]; then
++ opt_config="/lib/modules/$(@uname@ -r)/config"
++ elif [ -e "/boot/config-$(@uname@ -r)" ]; then
++ opt_config="/boot/config-$(@uname@ -r)"
++ elif [ -e "/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)" ]; then
++ opt_config="/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@ -r)"
++ elif [ -e "/lib/kernel/config-$(@uname@ -r)" ]; then
++ opt_config="/lib/kernel/config-$(@uname@ -r)"
+ fi
+ else
+ _info "Checking for vulnerabilities against specified kernel"
+@@ -2161,7 +2161,7 @@ else
+ fi
+
+ if [ "$os" = Linux ]; then
+- if [ -n "$opt_config" ] && ! grep -q '^CONFIG_' "$opt_config"; then
++ if [ -n "$opt_config" ] && ! @grep@ -q '^CONFIG_' "$opt_config"; then
+ # given file is invalid!
+ _warn "The kernel config file seems invalid, was expecting a plain-text file, ignoring it!"
+ opt_config=''
+@@ -2189,7 +2189,7 @@ if [ "$os" = Linux ]; then
+ fi
+
+ if [ -e "$opt_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ _debug "readelf not found"
+ kernel_err="missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the 'binutils' package"
+ elif [ "$opt_sysfs_only" = 1 ] || [ "$opt_hw_only" = 1 ]; then
+@@ -2207,20 +2207,20 @@ else
+ # vanilla kernels have with ^Linux version
+ # also try harder with some kernels (such as Red Hat) that don't have ^Linux version before their version string
+ # and check for FreeBSD
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E \
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E \
+ -e '^Linux version ' \
+ -e '^[[:alnum:]][^[:space:]]+ \([^[:space:]]+\) #[0-9]+ .+ (19|20)[0-9][0-9]$' \
+- -e '^FreeBSD [0-9]' | head -1)
++ -e '^FreeBSD [0-9]' | @head@ -1)
+ if [ -z "$kernel_version" ]; then
+ # try even harder with some kernels (such as ARM) that split the release (uname -r) and version (uname -v) in 2 adjacent strings
+- kernel_version=$("${opt_arch_prefix}strings" "$kernel" 2>/dev/null | grep -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | tr "\n" " ")
++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | @tr@ "\n" " ")
+ fi
+ if [ -n "$kernel_version" ]; then
+ # in live mode, check if the img we found is the correct one
+ if [ "$opt_live" = 1 ]; then
+ _verbose "Kernel image is \033[35m$kernel_version"
+- if ! echo "$kernel_version" | grep -qF "$(uname -r)"; then
+- _warn "Possible discrepancy between your running kernel '$(uname -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
++ if ! echo "$kernel_version" | @grep@ -qF "$(@uname@ -r)"; then
++ _warn "Possible discrepancy between your running kernel '$(@uname@ -r)' and the image '$kernel_version' we found ($opt_kernel), results might be incorrect"
+ fi
+ else
+ _info "Kernel image is \033[35m$kernel_version"
+@@ -2248,11 +2248,11 @@ sys_interface_check()
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" = 0 ] && [ -r "$file" ]; then
+ :
+ else
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")_RET=1")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")_RET=1")
+ return 1
+ fi
+
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")_RET"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")_RET"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ _debug "sysfs: MOCKING enabled for $file func returns $(eval echo \$$_mockvarname)"
+@@ -2261,17 +2261,17 @@ sys_interface_check()
+ fi
+
+ [ -n "$regex" ] || regex='.*'
+- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")"
++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")"
+ # shellcheck disable=SC2086,SC1083
+ if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
+ fullmsg="$(eval echo \$$_mockvarname)"
+- msg=$(echo "$fullmsg" | grep -Eo "$regex")
++ msg=$(echo "$fullmsg" | @grep@ -Eo "$regex")
+ _debug "sysfs: MOCKING enabled for $file, will return $fullmsg"
+ mocked=1
+ else
+- fullmsg=$(cat "$file")
+- msg=$(grep -Eo "$regex" "$file")
+- mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(basename "$file")='$fullmsg'")
++ fullmsg=$(@cat@ "$file")
++ msg=$(@grep@ -Eo "$regex" "$file")
++ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_SYSFS_$(@basename@ "$file")='$fullmsg'")
+ fi
+ if [ "$mode" = silent ]; then
+ return 0
+@@ -2280,15 +2280,15 @@ sys_interface_check()
+ return 0
+ fi
+ _info_nol "* Mitigated according to the /sys interface: "
+- if echo "$msg" | grep -qi '^not affected'; then
++ if echo "$msg" | @grep@ -qi '^not affected'; then
+ # Not affected
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qEi '^(kvm: )?mitigation'; then
++ elif echo "$msg" | @grep@ -qEi '^(kvm: )?mitigation'; then
+ # Mitigation: PTI
+ status=OK
+ pstatus green YES "$fullmsg"
+- elif echo "$msg" | grep -qi '^vulnerable'; then
++ elif echo "$msg" | @grep@ -qi '^vulnerable'; then
+ # Vulnerable
+ status=VULN
+ pstatus yellow NO "$fullmsg"
+@@ -2376,20 +2376,20 @@ write_msr_one_core()
+ # ret=4: msr doesn't exist, ret=127: msr.allow_writes=off
+ [ "$ret" = 127 ] && _write_denied=1
+ # or fallback to dd if it supports seek_bytes, we prefer it over perl because we can tell the difference between EPERM and EIO
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}" != 1 ]; then
+ _debug "write_msr: using dd"
+- dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
++ @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
+ # if it failed, inspect stderrto look for EPERM
+ if [ "$ret" != 0 ]; then
+- if dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | grep -qF 'Operation not permitted'; then
++ if @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>&1 | @grep@ -qF 'Operation not permitted'; then
+ _write_denied=1
+ fi
+ fi
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "write_msr: using perl"
+ ret=1
+- perl -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
++ @perl@ -e "open(M,'>','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -eq 8 ] && ret=0
+ else
+ _debug "write_msr: got no wrmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_ERR")
+@@ -2411,13 +2411,13 @@ write_msr_one_core()
+ msr_locked_down=1
+ write_msr_msg="your kernel is configured to deny writes to MSRs from user space"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "msr: Direct access to MSR"; then
++ elif @dmesg@ | @grep@ -qF "msr: Direct access to MSR"; then
+ _debug "write_msr: locked down kernel detected (Red Hat / Fedora)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+ write_msr_msg="your kernel is locked down (Fedora/Red Hat), please reboot without secure boot and retry"
+ return $WRITE_MSR_RET_LOCKDOWN
+- elif dmesg | grep -qF "raw MSR access is restricted"; then
++ elif @dmesg@ | @grep@ -qF "raw MSR access is restricted"; then
+ _debug "write_msr: locked down kernel detected (vanilla)"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
+ msr_locked_down=1
+@@ -2516,8 +2516,8 @@ read_msr_one_core()
+ return $READ_MSR_RET_KO
+ fi
+ # MSR 0x10: 0x000003e1 0xb106dded
+- _msr_h=$(echo "$_msr" | awk '{print $3}');
+- _msr_l=$(echo "$_msr" | awk '{print $4}');
++ _msr_h=$(echo "$_msr" | @awk@ '{print $3}');
++ _msr_l=$(echo "$_msr" | @awk@ '{print $4}');
+ read_msr_value=$(( _msr_h << 32 | _msr_l ))
+ else
+ # for Linux
+@@ -2528,15 +2528,15 @@ read_msr_one_core()
+ # if rdmsr is available, use it
+ elif command -v rdmsr >/dev/null 2>&1 && [ "${SMC_NO_RDMSR:-}" != 1 ]; then
+ _debug "read_msr: using rdmsr on $_msr"
+- read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(rdmsr -r $_msr_dec 2>/dev/null | @od@ -t u8 -A n)
+ # or if we have perl, use it, any 5.x version will work
+- elif command -v perl >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
++ elif command -v @perl@ >/dev/null 2>&1 && [ "${SMC_NO_PERL:-}" != 1 ]; then
+ _debug "read_msr: using perl on $_msr"
+- read_msr_value=$(perl -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | od -t u8 -A n)
++ read_msr_value=$(@perl@ -e "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and read(M,\$_,8) and print" | @od@ -t u8 -A n)
+ # fallback to dd if it supports skip_bytes
+- elif dd if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
+ _debug "read_msr: using dd on $_msr"
+- read_msr_value=$(dd if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | od -t u8 -A n)
++ read_msr_value=$(@dd@ if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | @od@ -t u8 -A n)
+ else
+ _debug "read_msr: got no rdmsr, perl or recent enough dd!"
+ mockme=$(printf "%b\n%b" "$mockme" "SMC_MOCK_RDMSR_${_msr}_RET=$READ_MSR_RET_ERR")
+@@ -2560,7 +2560,7 @@ check_cpu()
+ {
+ _info "\033[1;34mHardware check\033[0m"
+
+- if ! uname -m | grep -qwE 'x86_64|i[3-6]86|amd64'; then
++ if ! @uname@ -m | @grep@ -qwE 'x86_64|i[3-6]86|amd64'; then
+ return
+ fi
+
+@@ -3176,19 +3176,19 @@ check_redhat_canonical_spectre()
+ # if we were already called, don't do it again
+ [ -n "${redhat_canonical_spectre:-}" ] && return
+
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ redhat_canonical_spectre=-1
+ elif [ -n "$kernel_err" ]; then
+ redhat_canonical_spectre=-2
+ else
+ # Red Hat / Ubuntu specific variant1 patch is difficult to detect,
+ # let's use the two same tricks than the official Red Hat detection script uses:
+- if "${opt_arch_prefix}strings" "$kernel" | grep -qw noibrs && "${opt_arch_prefix}strings" "$kernel" | grep -qw noibpb; then
++ if "@strings@" "$kernel" | @grep@ -qw noibrs && "@strings@" "$kernel" | @grep@ -qw noibpb; then
+ # 1) detect their specific variant2 patch. If it's present, it means
+ # that the variant1 patch is also present (both were merged at the same time)
+ _debug "found redhat/canonical version of the variant2 patch (implies variant1)"
+ redhat_canonical_spectre=1
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'x86/pti:'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'x86/pti:'; then
+ # 2) detect their specific variant3 patch. If it's present, but the variant2
+ # is not, it means that only variant1 is present in addition to variant3
+ _debug "found redhat/canonical version of the variant3 patch (implies variant1 but not variant2)"
+@@ -3213,13 +3213,13 @@ check_has_vmm()
+ # If we find no evidence that this is the case, assume we're not (to avoid scaring users),
+ # this can always be overridden with --vmm in any case.
+ has_vmm=0
+- if command -v pgrep >/dev/null 2>&1; then
++ if command -v @pgrep@ >/dev/null 2>&1; then
+ # remove xenbus and xenwatch, also present inside domU
+ # remove libvirtd as it can also be used to manage containers and not VMs
+ # for each binary we want to grep, get the pids
+ for _binary in qemu kvm xenstored xenconsoled
+ do
+- for _pid in $(pgrep -x $_binary)
++ for _pid in $(@pgrep@ -x $_binary)
+ do
+ # resolve the exe symlink, if it doesn't resolve with -m,
+ # which doesn't even need the dest to exist, it means the symlink
+@@ -3235,7 +3235,7 @@ check_has_vmm()
+ else
+ # ignore SC2009 as `ps ax` is actually used as a fallback if `pgrep` isn't installed
+ # shellcheck disable=SC2009
+- if command -v ps >/devnull && ps ax | grep -vw grep | grep -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
++ if command -v ps >/devnull && ps ax | @grep@ -vw grep | @grep@ -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e '/xenstored' -e '/xenconsoled'; then
+ has_vmm=1
+ fi
+ fi
+@@ -3267,7 +3267,7 @@ check_CVE_2017_5753()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5753_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5753_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3319,20 +3319,20 @@ check_CVE_2017_5753_linux()
+ v1_mask_nospec=''
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+ else
+- perl -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 64 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 64 bits array_index_mask_nospec"
+ else
+- perl -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
++ @perl@ -ne '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END { exit($found) }' "$kernel"; ret=$?
+ if [ $ret -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of x86 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="x86 32 bits array_index_mask_nospec"
+ else
+- ret=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" | grep -w -e f3af8014 -e e320f014 -B2 | grep -B1 -w sbc | grep -w -c cmp)
++ ret=$("@objdump@" $objdump_options "$kernel" | @grep@ -w -e f3af8014 -e e320f014 -B2 | @grep@ -B1 -w sbc | @grep@ -w -c cmp)
+ if [ "$ret" -gt 0 ]; then
+ pstatus green YES "$ret occurrence(s) found of arm 32 bits array_index_mask_nospec()"
+ v1_mask_nospec="arm 32 bits array_index_mask_nospec"
+@@ -3376,12 +3376,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" $objdump_options "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" $objdump_options "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "mask_nospec64 macro is present and used"
+ v1_mask_nospec="arm64 mask_nospec64"
+@@ -3403,12 +3403,12 @@ check_CVE_2017_5753_linux()
+ pstatus yellow NO
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+- elif ! command -v perl >/dev/null 2>&1; then
++ elif ! command -v @perl@ >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'perl' binary, please install it"
+- elif ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+- "${opt_arch_prefix}objdump" -d "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
++ "@objdump@" -d "$kernel" | @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ && $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9); shift @r if @r>3'; ret=$?
+ if [ "$ret" -eq 9 ]; then
+ pstatus green YES "array_index_nospec macro is present and used"
+ v1_mask_nospec="arm64 array_index_nospec"
+@@ -3424,7 +3424,7 @@ check_CVE_2017_5753_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
++ if ! command -v "@objdump@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}objdump' tool, please install it, usually it's in the binutils package"
+ else
+ # here we disassemble the kernel and count the number of occurrences of the LFENCE opcode
+@@ -3434,7 +3434,7 @@ check_CVE_2017_5753_linux()
+ # so let's push the threshold to 70.
+ # v0.33+: now only count lfence opcodes after a jump, way less error-prone
+ # non patched kernel have between 0 and 20 matches, patched ones have at least 40-45
+- nb_lfence=$("${opt_arch_prefix}objdump" $objdump_options "$kernel" 2>/dev/null | grep -w -B1 lfence | grep -Ewc 'jmp|jne|je')
++ nb_lfence=$("@objdump@" $objdump_options "$kernel" 2>/dev/null | @grep@ -w -B1 lfence | @grep@ -Ewc 'jmp|jne|je')
+ if [ "$nb_lfence" -lt 30 ]; then
+ pstatus yellow NO "only $nb_lfence jump-then-lfence instructions found, should be >= 30 (heuristic)"
+ else
+@@ -3505,7 +3505,7 @@ check_CVE_2017_5715()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5715_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5715_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -3547,13 +3547,13 @@ check_CVE_2017_5715_linux()
+ # /proc/sys/kernel/ibrs_enabled: OpenSUSE tumbleweed
+ specex_knob_dir=$dir
+ ibrs_supported="$dir/ibrs_enabled exists"
+- ibrs_enabled=$(cat "$dir/ibrs_enabled" 2>/dev/null)
++ ibrs_enabled=$(@cat@ "$dir/ibrs_enabled" 2>/dev/null)
+ _debug "ibrs: found $dir/ibrs_enabled=$ibrs_enabled"
+ # if ibrs_enabled is there, ibpb_enabled will be in the same dir
+ if [ -e "$dir/ibpb_enabled" ]; then
+ # if the file is there, we have IBPB compiled-in (see note above for IBRS)
+ ibpb_supported="$dir/ibpb_enabled exists"
+- ibpb_enabled=$(cat "$dir/ibpb_enabled" 2>/dev/null)
++ ibpb_enabled=$(@cat@ "$dir/ibpb_enabled" 2>/dev/null)
+ _debug "ibpb: found $dir/ibpb_enabled=$ibpb_enabled"
+ else
+ _debug "ibpb: $dir/ibpb_enabled file doesn't exist"
+@@ -3568,7 +3568,7 @@ check_CVE_2017_5715_linux()
+ # which in that case means ibrs is supported *and* enabled for kernel & user
+ # as per the ibrs patch series v3
+ if [ -z "$ibrs_supported" ]; then
+- if grep ^flags "$procfs/cpuinfo" | grep -qw spec_ctrl_ibrs; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw spec_ctrl_ibrs; then
+ _debug "ibrs: found spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ ibrs_supported="spec_ctrl_ibrs flag in $procfs/cpuinfo"
+ # enabled=2 -> kernel & user
+@@ -3578,13 +3578,13 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -n "$fullmsg" ]; then
+ # when IBPB is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q 'IBPB'; then
++ if echo "$fullmsg" | @grep@ -q 'IBPB'; then
+ _debug "ibpb: found enabled in sysfs"
+ [ -z "$ibpb_supported" ] && ibpb_supported='IBPB found enabled in sysfs'
+ [ -z "$ibpb_enabled" ] && ibpb_enabled=1
+ fi
+ # when IBRS_FW is enabled on 4.15+, we can see it in sysfs
+- if echo "$fullmsg" | grep -q ', IBRS_FW'; then
++ if echo "$fullmsg" | @grep@ -q ', IBRS_FW'; then
+ _debug "ibrs: found IBRS_FW in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS_FW in sysfs'
+ ibrs_fw_enabled=1
+@@ -3592,13 +3592,13 @@ check_CVE_2017_5715_linux()
+ # when IBRS is enabled on 4.15+, we can see it in sysfs
+ # on a more recent kernel, classic "IBRS" is not even longer an option, because of the performance impact.
+ # only "Enhanced IBRS" is available (on CPUs with the IBRS_ALL flag)
+- if echo "$fullmsg" | grep -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
++ if echo "$fullmsg" | @grep@ -q -e '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
+ _debug "ibrs: found IBRS in sysfs"
+ [ -z "$ibrs_supported" ] && ibrs_supported='found IBRS in sysfs'
+ [ -z "$ibrs_enabled" ] && ibrs_enabled=3
+ fi
+ # checking for 'Enhanced IBRS' in sysfs, enabled on CPUs with IBRS_ALL
+- if echo "$fullmsg" | grep -q -e 'Enhanced IBRS'; then
++ if echo "$fullmsg" | @grep@ -q -e 'Enhanced IBRS'; then
+ [ -z "$ibrs_supported" ] && ibrs_supported='found Enhanced IBRS in sysfs'
+ # 4 isn't actually a valid value of the now extinct "ibrs_enabled" flag file,
+ # that only went from 0 to 3, so we use 4 as "enhanced ibrs is enabled"
+@@ -3617,11 +3617,11 @@ check_CVE_2017_5715_linux()
+ fi
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibrs_can_tell=1
+- ibrs_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e ', IBRS_FW' | head -1)
++ ibrs_supported=$("@strings@" "$kernel" | @grep@ -Fw -e ', IBRS_FW' | @head@ -1)
+ if [ -n "$ibrs_supported" ]; then
+ _debug "ibrs: found ibrs evidence in kernel image ($ibrs_supported)"
+ ibrs_supported="found '$ibrs_supported' in kernel image"
+@@ -3630,7 +3630,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$ibrs_supported" ] && [ -n "$opt_map" ]; then
+ ibrs_can_tell=1
+- if grep -q spec_ctrl "$opt_map"; then
++ if @grep@ -q spec_ctrl "$opt_map"; then
+ ibrs_supported="found spec_ctrl in symbols file"
+ _debug "ibrs: found '*spec_ctrl*' symbol in $opt_map"
+ fi
+@@ -3638,11 +3638,11 @@ check_CVE_2017_5715_linux()
+ # recent (4.15) vanilla kernels have IBPB but not IBRS, and without the debugfs tunables of Red Hat
+ # we can detect it directly in the image
+ if [ -z "$ibpb_supported" ] && [ -n "$kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ :
+ else
+ ibpb_can_tell=1
+- ibpb_supported=$("${opt_arch_prefix}strings" "$kernel" | grep -Fw -e 'ibpb' -e ', IBPB' | head -1)
++ ibpb_supported=$("@strings@" "$kernel" | @grep@ -Fw -e 'ibpb' -e ', IBPB' | @head@ -1)
+ if [ -n "$ibpb_supported" ]; then
+ _debug "ibpb: found ibpb evidence in kernel image ($ibpb_supported)"
+ ibpb_supported="found '$ibpb_supported' in kernel image"
+@@ -3691,9 +3691,9 @@ check_CVE_2017_5715_linux()
+ 2) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel, user space, and firmware code" ; else pstatus green YES "for both kernel and user space"; fi;;
+ 3) if [ "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel and firmware code"; else pstatus green YES; fi;;
+ 4) pstatus green YES "Enhanced flavor, performance impact will be greatly reduced";;
+- *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
+- then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
+- else
++ *) if [ "$cpuid_ibrs" != 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [ "$cpuid_spec_ctrl" != -1 ];
++ then pstatus yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
++ else
+ pstatus yellow UNKNOWN; fi;;
+ esac
+ fi
+@@ -3744,7 +3744,7 @@ check_CVE_2017_5715_linux()
+ bp_harden=''
+ if [ -r "$opt_config" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
++ bp_harden=$(@grep@ -w 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_config"
+@@ -3752,7 +3752,7 @@ check_CVE_2017_5715_linux()
+ fi
+ if [ -z "$bp_harden" ] && [ -n "$opt_map" ]; then
+ bp_harden_can_tell=1
+- bp_harden=$(grep -w bp_hardening_data "$opt_map")
++ bp_harden=$(@grep@ -w bp_hardening_data "$opt_map")
+ if [ -n "$bp_harden" ]; then
+ pstatus green YES
+ _debug "bp_harden: found '$bp_harden' in $opt_map"
+@@ -3770,11 +3770,11 @@ check_CVE_2017_5715_linux()
+ # We check the RETPOLINE kernel options
+ retpoline=0
+ if [ -r "$opt_config" ]; then
+- if grep -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
++ if @grep@ -q '^CONFIG_RETPOLINE=y' "$opt_config"; then
+ pstatus green YES
+ retpoline=1
+ # shellcheck disable=SC2046
+- _debug 'retpoline: found '$(grep '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
++ _debug 'retpoline: found '$(@grep@ '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
+ else
+ pstatus yellow NO
+ fi
+@@ -3795,8 +3795,8 @@ check_CVE_2017_5715_linux()
+ # since 5.15.28, this is now "Retpolines" as the implementation was switched to a generic one,
+ # so we look for both "retpoline" and "retpolines"
+ if [ "$opt_live" = 1 ] && [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qwi -e retpoline -e retpolines; then
+- if echo "$fullmsg" | grep -qwi minimal; then
++ if echo "$fullmsg" | @grep@ -qwi -e retpoline -e retpolines; then
++ if echo "$fullmsg" | @grep@ -qwi minimal; then
+ retpoline_compiler=0
+ retpoline_compiler_reason="kernel reports minimal retpoline compilation"
+ else
+@@ -3806,19 +3806,19 @@ check_CVE_2017_5715_linux()
+ fi
+ elif [ -n "$opt_map" ]; then
+ # look for the symbol
+- if grep -qw noretpoline_setup "$opt_map"; then
++ if @grep@ -qw noretpoline_setup "$opt_map"; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup symbol found in System.map"
+ fi
+ elif [ -n "$kernel" ]; then
+ # look for the symbol
+- if command -v "${opt_arch_prefix}nm" >/dev/null 2>&1; then
++ if command -v "@nm@" >/dev/null 2>&1; then
+ # the proper way: use nm and look for the symbol
+- if "${opt_arch_prefix}nm" "$kernel" 2>/dev/null | grep -qw 'noretpoline_setup'; then
++ if "@nm@" "$kernel" 2>/dev/null | @grep@ -qw 'noretpoline_setup'; then
+ retpoline_compiler=1
+ retpoline_compiler_reason="noretpoline_setup found in kernel symbols"
+ fi
+- elif grep -q noretpoline_setup "$kernel"; then
++ elif @grep@ -q noretpoline_setup "$kernel"; then
+ # if we don't have nm, nevermind, the symbol name is long enough to not have
+ # any false positive using good old grep directly on the binary
+ retpoline_compiler=1
+@@ -3847,7 +3847,7 @@ check_CVE_2017_5715_linux()
+ retp_enabled=-1
+ if [ "$opt_live" = 1 ]; then
+ if [ -e "$specex_knob_dir/retp_enabled" ]; then
+- retp_enabled=$(cat "$specex_knob_dir/retp_enabled" 2>/dev/null)
++ retp_enabled=$(@cat@ "$specex_knob_dir/retp_enabled" 2>/dev/null)
+ _debug "retpoline: found $specex_knob_dir/retp_enabled=$retp_enabled"
+ _info_nol " * Retpoline is enabled: "
+ if [ "$retp_enabled" = 1 ]; then
+@@ -3877,7 +3877,7 @@ check_CVE_2017_5715_linux()
+ rsb_filling=0
+ if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" != 1 ]; then
+ # if we're live and we aren't denied looking into /sys, let's do it
+- if echo "$msg" | grep -qw RSB; then
++ if echo "$msg" | @grep@ -qw RSB; then
+ rsb_filling=1
+ pstatus green YES
+ fi
+@@ -3886,7 +3886,7 @@ check_CVE_2017_5715_linux()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if grep -qw -e 'Filling RSB on context switch' "$kernel"; then
++ if @grep@ -qw -e 'Filling RSB on context switch' "$kernel"; then
+ rsb_filling=1
+ pstatus green YES
+ else
+@@ -4048,7 +4048,7 @@ check_CVE_2017_5715_bsd()
+ {
+ _info "* Mitigation 1"
+ _info_nol " * Kernel supports IBRS: "
+- ibrs_disabled=$(sysctl -n hw.ibrs_disable 2>/dev/null)
++ ibrs_disabled=$(@sysctl@ -n hw.ibrs_disable 2>/dev/null)
+ if [ -z "$ibrs_disabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4056,7 +4056,7 @@ check_CVE_2017_5715_bsd()
+ fi
+
+ _info_nol " * IBRS enabled and active: "
+- ibrs_active=$(sysctl -n hw.ibrs_active 2>/dev/null)
++ ibrs_active=$(@sysctl@ -n hw.ibrs_active 2>/dev/null)
+ if [ "$ibrs_active" = 1 ]; then
+ pstatus green YES
+ else
+@@ -4069,10 +4069,10 @@ check_CVE_2017_5715_bsd()
+ if [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
+ else
+- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1; then
++ if ! command -v "@readelf@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}readelf' tool, please install it, usually it's in the binutils package"
+ else
+- nb_thunks=$("${opt_arch_prefix}readelf" -s "$kernel" | grep -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
++ nb_thunks=$("@readelf@" -s "$kernel" | @grep@ -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e __x86_indirect_thunk_)
+ if [ "$nb_thunks" -gt 0 ]; then
+ retpoline=1
+ pstatus green YES "found $nb_thunks thunk(s)"
+@@ -4113,7 +4113,7 @@ check_CVE_2017_5715_bsd()
+ pti_performance_check()
+ {
+ _info_nol " * Reduced performance impact of PTI: "
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw pcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pcid; then
+ cpu_pcid=1
+ else
+ read_cpuid 0x1 0x0 $ECX 17 1 1; ret=$?
+@@ -4122,7 +4122,7 @@ pti_performance_check()
+ fi
+ fi
+
+- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo" | grep -qw invpcid; then
++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw invpcid; then
+ cpu_invpcid=1
+ else
+ read_cpuid 0x7 0x0 $EBX 10 1 1; ret=$?
+@@ -4147,7 +4147,7 @@ check_CVE_2017_5754()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2017_5754_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2017_5754_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4169,7 +4169,7 @@ check_CVE_2017_5754_linux()
+ kpti_can_tell=0
+ if [ -n "$opt_config" ]; then
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
++ kpti_support=$(@grep@ -w -e CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found option '$kpti_support' in $opt_config"
+ fi
+@@ -4179,7 +4179,7 @@ check_CVE_2017_5754_linux()
+ # so we try to find an exported symbol that is part of the PTI patch in System.map
+ # parse_kpti: arm
+ kpti_can_tell=1
+- kpti_support=$(grep -w -e kpti_force_enabled -e parse_kpti "$opt_map")
++ kpti_support=$(@grep@ -w -e kpti_force_enabled -e parse_kpti "$opt_map")
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $opt_map"
+ fi
+@@ -4189,10 +4189,10 @@ check_CVE_2017_5754_linux()
+ # nopti option that is part of the patch (kernel command line option)
+ # 'kpti=': arm
+ kpti_can_tell=1
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ else
+- kpti_support=$("${opt_arch_prefix}strings" "$kernel" | grep -w -e nopti -e kpti=)
++ kpti_support=$("@strings@" "$kernel" | @grep@ -w -e nopti -e kpti=)
+ if [ -n "$kpti_support" ]; then
+ _debug "kpti_support: found '$kpti_support' in $kernel"
+ fi
+@@ -4219,20 +4219,20 @@ check_CVE_2017_5754_linux()
+ dmesg_grep="$dmesg_grep|x86/pti: Unmapping kernel while in userspace"
+ # aarch64
+ dmesg_grep="$dmesg_grep|CPU features: detected( feature)?: Kernel page table isolation \(KPTI\)"
+- if grep ^flags "$procfs/cpuinfo" | grep -qw pti; then
++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw pti; then
+ # vanilla PTI patch sets the 'pti' flag in cpuinfo
+ _debug "kpti_enabled: found 'pti' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+- elif grep ^flags "$procfs/cpuinfo" | grep -qw kaiser; then
++ elif @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw kaiser; then
+ # kernel line 4.9 sets the 'kaiser' flag in cpuinfo
+ _debug "kpti_enabled: found 'kaiser' flag in $procfs/cpuinfo"
+ kpti_enabled=1
+ elif [ -e /sys/kernel/debug/x86/pti_enabled ]; then
+ # Red Hat Backport creates a dedicated file, see https://access.redhat.com/articles/3311301
+- kpti_enabled=$(cat /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
++ kpti_enabled=$(@cat@ /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
+ _debug "kpti_enabled: file /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
+ elif is_xen_dom0; then
+- pti_xen_pv_domU=$(xl dmesg | grep 'XPTI' | grep 'DomU enabled' | head -1)
++ pti_xen_pv_domU=$(xl @dmesg@ | @grep@ 'XPTI' | @grep@ 'DomU enabled' | @head@ -1)
+
+ [ -n "$pti_xen_pv_domU" ] && kpti_enabled=1
+ fi
+@@ -4307,7 +4307,7 @@ check_CVE_2017_5754_linux()
+ if [ -n "$kpti_support" ]; then
+ if [ -e "/sys/kernel/debug/x86/pti_enabled" ]; then
+ explain "Your kernel supports PTI but it's disabled, you can enable it with \`echo 1 > /sys/kernel/debug/x86/pti_enabled\`"
+- elif echo "$kernel_cmdline" | grep -q -w -e nopti -e pti=off; then
++ elif echo "$kernel_cmdline" | @grep@ -q -w -e nopti -e pti=off; then
+ explain "Your kernel supports PTI but it has been disabled on command-line, remove the nopti or pti=off option from your bootloader configuration"
+ else
+ explain "Your kernel supports PTI but it has been disabled, check \`dmesg\` right after boot to find clues why the system disabled it"
+@@ -4358,7 +4358,7 @@ check_CVE_2017_5754_linux()
+ check_CVE_2017_5754_bsd()
+ {
+ _info_nol "* Kernel supports Page Table Isolation (PTI): "
+- kpti_enabled=$(sysctl -n vm.pmap.pti 2>/dev/null)
++ kpti_enabled=$(@sysctl@ -n vm.pmap.pti 2>/dev/null)
+ if [ -z "$kpti_enabled" ]; then
+ pstatus yellow NO
+ else
+@@ -4429,7 +4429,7 @@ check_CVE_2018_3639()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3639_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3639_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4448,33 +4448,33 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports disabling speculative store bypass (SSB): "
+ if [ "$opt_live" = 1 ]; then
+- if grep -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssb="found in $procfs/self/status"
+ _debug "found Speculation.Store.Bypass: in $procfs/self/status"
+ fi
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! grep -q 'arm64_sys_' "$kernel"; then
+- kernel_ssb=$("${opt_arch_prefix}strings" "$kernel" | grep spec_store_bypass | head -n1);
++ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! @grep@ -q 'arm64_sys_' "$kernel"; then
++ kernel_ssb=$("@strings@" "$kernel" | @grep@ spec_store_bypass | @head@ -n1);
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in kernel"
+ fi
+ # arm64 kernels can have cpu_show_spec_store_bypass with ARM64_SSBD, so exclude them
+- if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! grep -q 'arm64_sys_' "$opt_map"; then
+- kernel_ssb=$(grep spec_store_bypass "$opt_map" | awk '{print $3}' | head -n1)
++ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && ! @grep@ -q 'arm64_sys_' "$opt_map"; then
++ kernel_ssb=$(@grep@ spec_store_bypass "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ # arm64 only:
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ]; then
+- kernel_ssb=$(grep -w cpu_enable_ssbs "$opt_map" | awk '{print $3}' | head -n1)
++ kernel_ssb=$(@grep@ -w cpu_enable_ssbs "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
+ [ -n "$kernel_ssb" ] && kernel_ssb="found $kernel_ssb in System.map"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$opt_config" ]; then
+- kernel_ssb=$(grep -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
++ kernel_ssb=$(@grep@ -w 'CONFIG_ARM64_SSBD=y' "$opt_config")
+ [ -n "$kernel_ssb" ] && kernel_ssb="CONFIG_ARM64_SSBD enabled in kconfig"
+ fi
+ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ]; then
+ # this string only appears in kernel if CONFIG_ARM64_SSBD is set
+- kernel_ssb=$(grep -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
++ kernel_ssb=$(@grep@ -w "Speculative Store Bypassing Safe (SSBS)" "$kernel")
+ [ -n "$kernel_ssb" ] && kernel_ssb="found 'Speculative Store Bypassing Safe (SSBS)' in kernel"
+ fi
+ # /arm64 only
+@@ -4489,31 +4489,31 @@ check_CVE_2018_3639_linux()
+ if [ "$opt_live" = 1 ]; then
+ # https://elixir.bootlin.com/linux/v5.0/source/fs/proc/array.c#L340
+ _info_nol "* SSB mitigation is enabled and active: "
+- if grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
++ if @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=1
+ pstatus green YES "per-thread through prctl"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=2
+ pstatus green YES "global"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus yellow NO
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=-2
+ pstatus blue NO "not vulnerable"
+- elif grep -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
++ elif @grep@ -Eq 'Speculation.?Store.?Bypass:[[:space:]]+unknown' "$procfs/self/status" 2>/dev/null; then
+ kernel_ssbd_enabled=0
+ pstatus blue NO
+ else
+- pstatus blue UNKNOWN "unknown value: $(grep -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | cut -d: -f2-)"
++ pstatus blue UNKNOWN "unknown value: $(@grep@ -E 'Speculation.?Store.?Bypass:' "$procfs/self/status" 2>/dev/null | @cut@ -d: -f2-)"
+ fi
+
+ if [ "$kernel_ssbd_enabled" = 1 ]; then
+ _info_nol "* SSB mitigation currently active for selected processes: "
+ # silence grep's stderr here to avoid ENOENT errors from processes that have exited since the shell's expansion of the *
+- mitigated_processes=$(find /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
+- | xargs -r0 grep -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
+- | sed s/status/exe/ | xargs -r -n1 readlink -f 2>/dev/null | xargs -r -n1 basename | sort -u | tr "\n" " " | sed 's/ $//')
++ mitigated_processes=$(@find@ /proc -mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
++ | @xargs@ -r0 @grep@ -El 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated' 2>/dev/null \
++ | @sed@ s/status/exe/ | @xargs@ -r -n1 readlink -f 2>/dev/null | @xargs@ -r -n1 @basename@ | @sort@ -u | @tr@ "\n" " " | @sed@ 's/ $//')
+ if [ -n "$mitigated_processes" ]; then
+ pstatus green YES "$mitigated_processes"
+ else
+@@ -4565,7 +4565,7 @@ check_CVE_2018_3639_linux()
+ check_CVE_2018_3639_bsd()
+ {
+ _info_nol "* Kernel supports speculation store bypass: "
+- if sysctl hw.spec_store_bypass_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.spec_store_bypass_disable >/dev/null 2>&1; then
+ kernel_ssb=1
+ pstatus green YES
+ else
+@@ -4574,7 +4574,7 @@ check_CVE_2018_3639_bsd()
+ fi
+
+ _info_nol "* Speculation store bypass is administratively enabled: "
+- ssb_enabled=$(sysctl -n hw.spec_store_bypass_disable 2>/dev/null)
++ ssb_enabled=$(@sysctl@ -n hw.spec_store_bypass_disable 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable=$ssb_enabled"
+ case "$ssb_enabled" in
+ 0) pstatus yellow NO "disabled";;
+@@ -4584,7 +4584,7 @@ check_CVE_2018_3639_bsd()
+ esac
+
+ _info_nol "* Speculation store bypass is currently active: "
+- ssb_active=$(sysctl -n hw.spec_store_bypass_disable_active 2>/dev/null)
++ ssb_active=$(@sysctl@ -n hw.spec_store_bypass_disable_active 2>/dev/null)
+ _debug "hw.spec_store_bypass_disable_active=$ssb_active"
+ case "$ssb_active" in
+ 1) pstatus green YES;;
+@@ -4656,7 +4656,7 @@ check_CVE_2018_3620()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3620_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3620_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4674,14 +4674,14 @@ check_CVE_2018_3620_linux()
+ fi
+ if [ "$opt_sysfs_only" != 1 ]; then
+ _info_nol "* Kernel supports PTE inversion: "
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ pstatus yellow UNKNOWN "missing 'strings' tool, please install it"
+ pteinv_supported=-1
+ elif [ -n "$kernel_err" ]; then
+ pstatus yellow UNKNOWN "$kernel_err"
+ pteinv_supported=-1
+ else
+- if "${opt_arch_prefix}strings" "$kernel" | grep -Fq 'PTE Inversion'; then
++ if "@strings@" "$kernel" | @grep@ -Fq 'PTE Inversion'; then
+ pstatus green YES "found in kernel image"
+ _debug "pteinv: found pte inversion evidence in kernel image"
+ pteinv_supported=1
+@@ -4694,7 +4694,7 @@ check_CVE_2018_3620_linux()
+ _info_nol "* PTE inversion enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -q 'Mitigation: PTE Inversion'; then
++ if echo "$fullmsg" | @grep@ -q 'Mitigation: PTE Inversion'; then
+ pstatus green YES
+ pteinv_active=1
+ else
+@@ -4742,7 +4742,7 @@ check_CVE_2018_3620_bsd()
+ else
+ _debug "vmm module already loaded"
+ fi
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ # https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
+ # this is very difficult to detect that the kernel reserved the 0 page, but this fix
+ # is part of the exact same patch than the other L1TF CVE, so we detect it
+@@ -4772,7 +4772,7 @@ check_CVE_2018_3646()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_3646_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_3646_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -4798,7 +4798,7 @@ check_CVE_2018_3646_linux()
+ if [ "$opt_live" = 1 ]; then
+ if ! [ -r /sys/module/kvm_intel/parameters/ept ]; then
+ pstatus blue N/A "the kvm_intel module is not loaded"
+- elif [ "$(cat /sys/module/kvm_intel/parameters/ept)" = N ]; then
++ elif [ "$(@cat@ /sys/module/kvm_intel/parameters/ept)" = N ]; then
+ pstatus green YES
+ ept_disabled=1
+ else
+@@ -4810,15 +4810,15 @@ check_CVE_2018_3646_linux()
+
+ _info "* Mitigation 2"
+ _info_nol " * L1D flush is supported by kernel: "
+- if [ "$opt_live" = 1 ] && grep -qw flush_l1d "$procfs/cpuinfo"; then
++ if [ "$opt_live" = 1 ] && @grep@ -qw flush_l1d "$procfs/cpuinfo"; then
+ l1d_kernel="found flush_l1d in $procfs/cpuinfo"
+ fi
+ if [ -z "$l1d_kernel" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ l1d_kernel_err="missing '${opt_arch_prefix}strings' tool, please install it, usually it's in the binutils package"
+ elif [ -n "$kernel_err" ]; then
+ l1d_kernel_err="$kernel_err"
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -qw flush_l1d; then
++ elif "@strings@" "$kernel" | @grep@ -qw flush_l1d; then
+ l1d_kernel='found flush_l1d in kernel image'
+ fi
+ fi
+@@ -4839,20 +4839,20 @@ check_CVE_2018_3646_linux()
+ # $l1dstatus is one of (auto|vulnerable|conditional cache flushes|cache flushes|EPT disabled|flush not necessary)
+ # $smtstatus is one of (vulnerable|disabled)
+ # can also just be "Not affected"
+- if echo "$fullmsg" | grep -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
++ if echo "$fullmsg" | @grep@ -Eq -e 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not necessary)'; then
+ l1d_mode=0
+ pstatus yellow NO
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) conditional cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) conditional cache flushes'; then
+ l1d_mode=1
+ pstatus green YES "conditional flushes"
+- elif echo "$fullmsg" | grep -Eq '(VMX:|L1D) cache flushes'; then
++ elif echo "$fullmsg" | @grep@ -Eq '(VMX:|L1D) cache flushes'; then
+ l1d_mode=2
+ pstatus green YES "unconditional flushes"
+ else
+ if is_xen_dom0; then
+- l1d_xen_hardware=$(xl dmesg | grep 'Hardware features:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_hypervisor=$(xl dmesg | grep 'Xen settings:' | grep 'L1D_FLUSH' | head -1)
+- l1d_xen_pv_domU=$(xl dmesg | grep 'PV L1TF shadowing:' | grep 'DomU enabled' | head -1)
++ l1d_xen_hardware=$(xl @dmesg@ | @grep@ 'Hardware features:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_hypervisor=$(xl @dmesg@ | @grep@ 'Xen settings:' | @grep@ 'L1D_FLUSH' | @head@ -1)
++ l1d_xen_pv_domU=$(xl @dmesg@ | @grep@ 'PV L1TF shadowing:' | @grep@ 'DomU enabled' | @head@ -1)
+
+ if [ -n "$l1d_xen_hardware" ] && [ -n "$l1d_xen_hypervisor" ] && [ -n "$l1d_xen_pv_domU" ]; then
+ l1d_mode=5
+@@ -4883,7 +4883,7 @@ check_CVE_2018_3646_linux()
+
+ _info_nol " * Hardware-backed L1D flush supported: "
+ if [ "$opt_live" = 1 ]; then
+- if grep -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
++ if @grep@ -qw flush_l1d "$procfs/cpuinfo" || [ -n "$l1d_xen_hardware" ]; then
+ pstatus green YES "performance impact of the mitigation will be greatly reduced"
+ else
+ pstatus blue NO "flush will be done in software, this is slower"
+@@ -4955,7 +4955,7 @@ check_CVE_2018_3646_linux()
+ check_CVE_2018_3646_bsd()
+ {
+ _info_nol "* Kernel supports L1D flushing: "
+- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_l1d_supported=1
+ else
+@@ -4964,7 +4964,7 @@ check_CVE_2018_3646_bsd()
+ fi
+
+ _info_nol "* L1D flushing is enabled: "
+- kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush 2>/dev/null)
++ kernel_l1d_enabled=$(@sysctl@ -n hw.vmm.vmx.l1d_flush 2>/dev/null)
+ case "$kernel_l1d_enabled" in
+ 0) pstatus yellow NO;;
+ 1) pstatus green YES;;
+@@ -5018,7 +5018,7 @@ check_CVE_2018_12127()
+ ###################
+ # MDSUM SECTION
+
+-# Microarchitectural Data Sampling Uncacheable Memory
++# Microarchitectural Data Sampling Uncacheable Memory
+ check_CVE_2019_11091()
+ {
+ cve='CVE-2019-11091'
+@@ -5032,7 +5032,7 @@ check_mds()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_mds_linux "$cve"
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_mds_bsd "$cve"
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5043,7 +5043,7 @@ check_mds_bsd()
+ {
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ if [ "$opt_live" = 1 ]; then
+- if sysctl hw.mds_disable >/dev/null 2>&1; then
++ if @sysctl@ hw.mds_disable >/dev/null 2>&1; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5051,7 +5051,7 @@ check_mds_bsd()
+ kernel_md_clear=0
+ fi
+ else
+- if grep -Fq hw.mds_disable $opt_kernel; then
++ if @grep@ -Fq hw.mds_disable $opt_kernel; then
+ pstatus green YES
+ kernel_md_clear=1
+ else
+@@ -5061,8 +5061,8 @@ check_mds_bsd()
+ fi
+
+ _info_nol "* CPU Hyper-Threading (SMT) is disabled: "
+- if sysctl machdep.hyperthreading_allowed >/dev/null 2>&1; then
+- kernel_smt_allowed=$(sysctl -n machdep.hyperthreading_allowed 2>/dev/null)
++ if @sysctl@ machdep.hyperthreading_allowed >/dev/null 2>&1; then
++ kernel_smt_allowed=$(@sysctl@ -n machdep.hyperthreading_allowed 2>/dev/null)
+ if [ "$kernel_smt_allowed" = 1 ]; then
+ pstatus yellow NO
+ else
+@@ -5074,7 +5074,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is enabled: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_enabled=$(sysctl -n hw.mds_disable 2>/dev/null)
++ kernel_mds_enabled=$(@sysctl@ -n hw.mds_disable 2>/dev/null)
+ else
+ kernel_mds_enabled=0
+ fi
+@@ -5088,7 +5088,7 @@ check_mds_bsd()
+
+ _info_nol "* Kernel mitigation is active: "
+ if [ "$kernel_md_clear" = 1 ]; then
+- kernel_mds_state=$(sysctl -n hw.mds_disable_state 2>/dev/null)
++ kernel_mds_state=$(@sysctl@ -n hw.mds_disable_state 2>/dev/null)
+ else
+ kernel_mds_state=inactive
+ fi
+@@ -5146,16 +5146,16 @@ check_mds_linux()
+ _info_nol "* Kernel supports using MD_CLEAR mitigation: "
+ kernel_md_clear=''
+ kernel_md_clear_can_tell=1
+- if [ "$opt_live" = 1 ] && grep ^flags "$procfs/cpuinfo" | grep -qw md_clear; then
++ if [ "$opt_live" = 1 ] && @grep@ ^flags "$procfs/cpuinfo" | @grep@ -qw md_clear; then
+ kernel_md_clear="md_clear found in $procfs/cpuinfo"
+ pstatus green YES "$kernel_md_clear"
+ fi
+ if [ -z "$kernel_md_clear" ]; then
+- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1; then
++ if ! command -v "@strings@" >/dev/null 2>&1; then
+ kernel_md_clear_can_tell=0
+ elif [ -n "$kernel_err" ]; then
+ kernel_md_clear_can_tell=0
+- elif "${opt_arch_prefix}strings" "$kernel" | grep -q 'Clear CPU buffers'; then
++ elif "@strings@" "$kernel" | @grep@ -q 'Clear CPU buffers'; then
+ _debug "md_clear: found 'Clear CPU buffers' string in kernel image"
+ kernel_md_clear='found md_clear implementation evidence in kernel image'
+ pstatus green YES "$kernel_md_clear"
+@@ -5171,7 +5171,7 @@ check_mds_linux()
+
+ if [ "$opt_live" = 1 ] && [ "$sys_interface_available" = 1 ]; then
+ _info_nol "* Kernel mitigation is enabled and active: "
+- if echo "$fullmsg" | grep -qi ^mitigation; then
++ if echo "$fullmsg" | @grep@ -qi ^mitigation; then
+ mds_mitigated=1
+ pstatus green YES
+ else
+@@ -5179,7 +5179,7 @@ check_mds_linux()
+ pstatus yellow NO
+ fi
+ _info_nol "* SMT is either mitigated or disabled: "
+- if echo "$fullmsg" | grep -Eq 'SMT (disabled|mitigated)'; then
++ if echo "$fullmsg" | @grep@ -Eq 'SMT (disabled|mitigated)'; then
+ mds_smt_mitigated=1
+ pstatus green YES
+ else
+@@ -5265,7 +5265,7 @@ check_CVE_2019_11135()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2019_11135_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2019_11135_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5286,7 +5286,7 @@ check_CVE_2019_11135_linux()
+ kernel_taa=''
+ if [ -n "$kernel_err" ]; then
+ kernel_taa_err="$kernel_err"
+- elif grep -q 'tsx_async_abort' "$kernel"; then
++ elif @grep@ -q 'tsx_async_abort' "$kernel"; then
+ kernel_taa="found tsx_async_abort in kernel image"
+ fi
+ if [ -n "$kernel_taa" ]; then
+@@ -5300,7 +5300,7 @@ check_CVE_2019_11135_linux()
+ _info_nol "* TAA mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5335,9 +5335,9 @@ check_CVE_2019_11135_linux()
+ else
+ if [ "$opt_paranoid" = 1 ]; then
+ # in paranoid mode, TSX or SMT enabled are not OK, even if TAA is mitigated
+- if ! echo "$fullmsg" | grep -qF 'TSX disabled'; then
++ if ! echo "$fullmsg" | @grep@ -qF 'TSX disabled'; then
+ pvulnstatus $cve VULN "TSX must be disabled for full mitigation"
+- elif echo "$fullmsg" | grep -qF 'SMT vulnerable'; then
++ elif echo "$fullmsg" | @grep@ -qF 'SMT vulnerable'; then
+ pvulnstatus $cve VULN "SMT (HyperThreading) must be disabled for full mitigation"
+ else
+ pvulnstatus $cve "$status" "$msg"
+@@ -5367,7 +5367,7 @@ check_CVE_2018_12207()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2018_12207_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2018_12207_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5391,7 +5391,7 @@ check_CVE_2018_12207_linux()
+ if [ -n "$kernel_err" ]; then
+ kernel_itlbmh_err="$kernel_err"
+ # commit 5219505fcbb640e273a0d51c19c38de0100ec5a9
+- elif grep -q 'itlb_multihit' "$kernel"; then
++ elif @grep@ -q 'itlb_multihit' "$kernel"; then
+ kernel_itlbmh="found itlb_multihit in kernel image"
+ fi
+ if [ -n "$kernel_itlbmh" ]; then
+@@ -5405,7 +5405,7 @@ check_CVE_2018_12207_linux()
+ _info_nol "* iTLB Multihit mitigation enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qF 'Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qF 'Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5447,7 +5447,7 @@ check_CVE_2018_12207_linux()
+ check_CVE_2018_12207_bsd()
+ {
+ _info_nol "* Kernel supports disabling superpages for executable mappings under EPT: "
+- kernel_2m_x_ept=$(sysctl -n vm.pmap.allow_2m_x_ept 2>/dev/null)
++ kernel_2m_x_ept=$(@sysctl@ -n vm.pmap.allow_2m_x_ept 2>/dev/null)
+ if [ -z "$kernel_2m_x_ept" ]; then
+ pstatus yellow NO
+ else
+@@ -5484,7 +5484,7 @@ check_CVE_2020_0543()
+ _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
+ if [ "$os" = Linux ]; then
+ check_CVE_2020_0543_linux
+- elif echo "$os" | grep -q BSD; then
++ elif echo "$os" | @grep@ -q BSD; then
+ check_CVE_2020_0543_bsd
+ else
+ _warn "Unsupported OS ($os)"
+@@ -5505,7 +5505,7 @@ check_CVE_2020_0543_linux()
+ kernel_srbds=''
+ if [ -n "$kernel_err" ]; then
+ kernel_srbds_err="$kernel_err"
+- elif grep -q 'Dependent on hypervisor' "$kernel"; then
++ elif @grep@ -q 'Dependent on hypervisor' "$kernel"; then
+ kernel_srbds="found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation"
+ fi
+ if [ -n "$kernel_srbds" ]; then
+@@ -5518,7 +5518,7 @@ check_CVE_2020_0543_linux()
+ _info_nol "* SRBDS mitigation control is enabled and active: "
+ if [ "$opt_live" = 1 ]; then
+ if [ -n "$fullmsg" ]; then
+- if echo "$fullmsg" | grep -qE '^Mitigation'; then
++ if echo "$fullmsg" | @grep@ -qE '^Mitigation'; then
+ pstatus green YES "$fullmsg"
+ else
+ pstatus yellow NO
+@@ -5608,8 +5608,8 @@ fi
+ # now run the checks the user asked for
+ for cve in $supported_cve_list
+ do
+- if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | grep -qw "$cve"; then
+- check_"$(echo "$cve" | tr - _)"
++ if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | @grep@ -qw "$cve"; then
++ check_"$(echo "$cve" | @tr@ - _)"
+ _info
+ fi
+ done
+@@ -5623,17 +5623,17 @@ if [ "$bad_accuracy" = 1 ]; then
+ _warn "We're missing some kernel info (see -v), accuracy might be reduced"
+ fi
+
+-_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | grep -v -F 'mockme=' | sort | tr "\n" '|')
++_vars=$(set | @grep@ -Ev '^[A-Z_[:space:]]' | @grep@ -v -F 'mockme=' | @sort@ | @tr@ "\n" '|')
+ _debug "variables at end of script: $_vars"
+
+ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+- if command -v "gzip" >/dev/null 2>&1; then
++ if command -v "@gzip@" >/dev/null 2>&1; then
+ # not a useless use of cat: gzipping cpuinfo directly doesn't work well
+ # shellcheck disable=SC2002
+- if command -v "base64" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | base64 -w0)"
+- elif command -v "uuencode" >/dev/null 2>&1; then
+- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c | uuencode -m - | grep -Fv 'begin-base64' | grep -Fxv -- '====' | tr -d "\n")"
++ if command -v "@base64@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @base64@ -w0)"
++ elif command -v "@uuencode@" >/dev/null 2>&1; then
++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@ -c | @uuencode@ -m - | @grep@ -Fv 'begin-base64' | @grep@ -Fxv -- '====' | @tr@ -d "\n")"
+ fi
+ fi
+ if [ -n "$mock_cpuinfo" ]; then
+@@ -5642,7 +5642,7 @@ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
+ fi
+ _info ""
+ # shellcheck disable=SC2046
+- _warn "To mock this CPU, set those vars: "$(echo "$mockme" | sort -u)
++ _warn "To mock this CPU, set those vars: "$(echo "$mockme" | @sort@ -u)
+ fi
+
+ if [ "$opt_explain" = 0 ]; then
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
new file mode 100644
index 0000000000..afec52b418
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
@@ -0,0 +1,26 @@
+From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 5 Nov 2022 23:22:31 +0800
+Subject: [PATCH] Add support for Guix System kernel.
+
+---
+ spectre-meltdown-checker.sh | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 248a444..855a090 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
+ [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
++ # Guix System:
++ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+ [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
+ # Clear Linux:
+
+base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
+--
+2.38.0
base-commit: 2757de2e2b271d87f6f72ba4161c2225fbdc9e78
--
2.38.1
^ permalink raw reply related [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v4] gnu: Add spectre-meltdown-checker.
2022-11-12 15:15 ` [bug#59053] [PATCH v4] " Hilton Chain via Guix-patches via
@ 2022-11-12 16:58 ` Liliana Marie Prikler
2022-11-13 13:09 ` [bug#59053] [PATCH v5] " Hilton Chain via Guix-patches via
0 siblings, 1 reply; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-12 16:58 UTC (permalink / raw)
To: Hilton Chain; +Cc: 59053
Am Samstag, dem 12.11.2022 um 23:15 +0800 schrieb Hilton Chain:
> * gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
> * gnu/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch:
> New file.
> * gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch:
> New file.
> * gnu/packages/patches/spectre-meltdown-checker-stage-commands-for-
> substitution.patch:
> New file.
> * gnu/local.mk (dist_patch_DATA): Add patches.
> ---
> v3 -> v4:
> 1. Remove downloading function.
> 2. Add option for supplying a local database.
>
> gnu/local.mk | 3 +
> gnu/packages/linux.scm | 54 +
> ...ker-remove-builtin-firmware-database.patch | 243 +++
> ...cker-stage-commands-for-substitution.patch | 1849
> +++++++++++++++++
> ...n-checker-support-guix-system-kernel.patch | 26 +
> 5 files changed, 2175 insertions(+)
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> remove-builtin-firmware-database.patch
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> stage-commands-for-substitution.patch
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> support-guix-system-kernel.patch
>
> diff --git a/gnu/local.mk b/gnu/local.mk
> index e3e02314bb..46b299d0d6 100644
> --- a/gnu/local.mk
> +++ b/gnu/local.mk
> @@ -1857,6 +1857,9 @@ dist_patch_DATA
> = \
> %D%/packages/patches/syslinux-strip-gnu-property.patch \
> %D%/packages/patches/snappy-add-O2-flag-in-
> CmakeLists.txt.patch \
> %D%/packages/patches/snappy-add-inline-for-GCC.patch \
> + %D%/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch \
> + %D%/packages/patches/spectre-meltdown-checker-stage-commands-for-
> substitution.patch \
> + %D%/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch \
> %D%/packages/patches/sphinxbase-fix-doxygen.patch \
> %D%/packages/patches/spice-vdagent-glib-2.68.patch \
> %D%/packages/patches/sssd-optional-systemd.patch \
> diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
> index fea33dfa0b..1807fd5655 100644
> --- a/gnu/packages/linux.scm
> +++ b/gnu/packages/linux.scm
> @@ -9595,3 +9595,57 @@ (define-public edac-utils
> error detection and correction (EDAC).")
> (home-page "https://github.com/grondo/edac-utils")
> (license license:gpl2+)))
> +
> +(define-public spectre-meltdown-checker
> + (package
> + (name "spectre-meltdown-checker")
> + (version "0.45")
> + (source (origin
> + (method git-fetch)
> + (uri (git-reference
> + (url
> "https://github.com/speed47/spectre-meltdown-checker")
> + (commit (string-append "v" version))))
> + (file-name (git-file-name name version))
> + (patches
> + (search-patches
> + ;;
> https://github.com/speed47/spectre-meltdown-checker/pull/441
> + "spectre-meltdown-checker-support-guix-system-
> kernel.patch"
> + ;; NOTE: Update these patches when updating.
> + "spectre-meltdown-checker-remove-builtin-firmware-
> database.patch"
Is this comment still needed?
> + "spectre-meltdown-checker-stage-commands-for-
> substitution.patch"))
> + ;; Remove builtin firmware database.
> + (modules '((guix build utils)))
> + (snippet '(substitute* "spectre-meltdown-checker.sh"
> + (("^# [AI],.*") "")))
> + (sha256
> + (base32
> +
> "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
> + (build-system copy-build-system)
> + (arguments
> + (list #:install-plan
> + #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-
> checker"))
> + #:phases
> + #~(modify-phases %standard-phases
> + (add-after 'unpack 'fixpath
> + (lambda* (#:key inputs #:allow-other-keys)
> + (substitute* "spectre-meltdown-checker.sh"
> + (("@sysctl@") (search-input-file inputs
> "/sbin/sysctl"))
> + (("@([a-z0-9]*)@" _ command _)
> + (search-input-file
> + inputs (string-append "/bin/"
> command)))))))))
> + (inputs
> + (list kmod
> + lz4
> + lzop
> + perl
> + procps
> + sharutils
> + util-linux
> + zstd))
> + (home-page
> "https://github.com/speed47/spectre-meltdown-checker")
> + (synopsis "CPU vulnerability / mitigation checker")
> + (description
> + "This package provides a shell script to assess your system's
> resilience
> +against the several transient execution CVEs that were published
> since early
> +2018, and give you guidance as to how to mitigate them.")
> + (license license:gpl3)))
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-
> builtin-firmware-database.patch b/gnu/packages/patches/spectre-
> meltdown-checker-remove-builtin-firmware-database.patch
> new file mode 100644
> index 0000000000..888bb0c2b1
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch
> @@ -0,0 +1,243 @@
> +From a3a9b7ca93071393e6bfd999fedd737009718aab Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Sat, 12 Nov 2022 22:45:24 +0800
> +Subject: [PATCH 1/2] Remove builtin firmware database.
> +
> +1. Remove downloading function.
> +2. Add option for supplying a local database.
> +---
> + spectre-meltdown-checker.sh | 180 +++------------------------------
> ---
> + 1 file changed, 15 insertions(+), 165 deletions(-)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 30f760c..ce46970 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -22,8 +22,6 @@ exit_cleanup()
> + [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm
> -f "$dumped_config"
> + [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm
> -f "$kerneltmp"
> + [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm
> -f "$kerneltmp2"
> +- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm
> -f "$mcedb_tmp"
> +- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm
> -rf "$intel_tmp"
> + [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug
> 2>/dev/null
> + [ "${mounted_procfs:-}" = 1 ] && umount "$procfs"
> 2>/dev/null
> + [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
> +@@ -93,9 +91,7 @@ show_usage()
> + --vmm [auto,yes,no] override the detection of the
> presence of a hypervisor, default: auto
> + --allow-msr-write allow probing for write-only
> MSRs, this might produce kernel logs or be blocked by your system
> + --cpu [#,all] interact with CPUID and MSR
> of CPU core number #, or all (default: CPU core 0)
> +- --update-fwdb update our local copy of the
> CPU microcodes versions database (using the awesome
> +- MCExtractor project and the
> Intel firmwares GitHub repository)
> +- --update-builtin-fwdb same as --update-fwdb but
> update builtin DB inside the script itself
> ++ --with-fwdb FILE supply the CPU microcodes
> versions database
> + --dump-mock-data used to mimick a CPU on an
> other system, mainly used to help debugging this script
> +
> + Return codes:
> +@@ -837,147 +833,6 @@ show_header()
> + _info
> + }
> +
> +-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
> +-mcedb_cache="$HOME/.mcedb"
> +-update_fwdb()
> +-{
> +- show_header
> +-
> +- set -e
> +-
> +- if [ -r "$mcedb_cache" ]; then
> +- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4
> }' "$mcedb_cache")
> +- fi
> +-
> +- # first, download the MCE.db from the excellent platomav's
> MCExtractor project
> +- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
> +-
> mcedb_url='https://github.com/platomav/MCExtractor/raw/master/M
> CE.db'
> +- _info_nol "Fetching MCE.db from the MCExtractor project... "
> +- if command -v wget >/dev/null 2>&1; then
> +- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
> +- elif command -v curl >/dev/null 2>&1; then
> +- curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
> +- elif command -v fetch >/dev/null 2>&1; then
> +- fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
> +- else
> +- echo ERROR "please install one of \`wget\`, \`curl\`
> of \`fetch\` programs"
> +- return 1
> +- fi
> +- if [ "$ret" != 0 ]; then
> +- echo ERROR "error $ret while downloading MCE.db"
> +- return $ret
> +- fi
> +- echo DONE
> +-
> +- # second, get the Intel firmwares from GitHub
> +- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
> +-
> intel_url="https://github.com/intel/Intel-Linux-Processor-Micro
> code-Data-Files/archive/main.zip"
> +- _info_nol "Fetching Intel firmwares... "
> +- ##
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
> +- if command -v wget >/dev/null 2>&1; then
> +- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
> +- elif command -v curl >/dev/null 2>&1; then
> +- curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
> +- elif command -v fetch >/dev/null 2>&1; then
> +- fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
> +- else
> +- echo ERROR "please install one of \`wget\`, \`curl\`
> of \`fetch\` programs"
> +- return 1
> +- fi
> +- if [ "$ret" != 0 ]; then
> +- echo ERROR "error $ret while downloading Intel
> firmwares"
> +- return $ret
> +- fi
> +- echo DONE
> +-
> +- # now extract MCEdb contents using sqlite
> +- _info_nol "Extracting MCEdb data... "
> +- if ! command -v sqlite3 >/dev/null 2>&1; then
> +- echo ERROR "please install the \`sqlite3\` program"
> +- return 1
> +- fi
> +- mcedb_revision=$(sqlite3 "$mcedb_tmp" "select revision from
> MCE")
> +- if [ -z "$mcedb_revision" ]; then
> +- echo ERROR "downloaded file seems invalid"
> +- return 1
> +- fi
> +- sqlite3 "$mcedb_tmp" "alter table Intel add column origin
> text"
> +- sqlite3 "$mcedb_tmp" "update Intel set origin='mce'"
> +-
> +- echo OK "MCExtractor database revision $mcedb_revision"
> +-
> +- # parse Intel firmwares to get their versions
> +- _info_nol "Integrating Intel firmwares data to db... "
> +- if ! command -v unzip >/dev/null 2>&1; then
> +- echo ERROR "please install the \`unzip\` program"
> +- return 1
> +- fi
> +- ( cd "$intel_tmp" && unzip fw.zip >/dev/null; )
> +- if ! [ -d "$intel_tmp/Intel-Linux-Processor-Microcode-Data-
> Files-main/intel-ucode" ]; then
> +- echo ERROR "expected the 'intel-ucode' folder in the
> downloaded zip file"
> +- return 1
> +- fi
> +-
> +- if ! command -v iucode_tool >/dev/null 2>&1; then
> +- if ! command -v iucode-tool >/dev/null 2>&1; then
> +- echo ERROR "please install the \`iucode-
> tool\` program"
> +- return 1
> +- else
> +- iucode_tool="iucode-tool"
> +- fi
> +- else
> +- iucode_tool="iucode_tool"
> +- fi
> +- # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev
> 0x0217, size 5120
> +- # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev
> 0x0107, size 5120
> +- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-
> Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
> +- do
> +- _line=$( echo "$_line" | tr -d ',')
> +- _cpuid=$( echo "$_line" | awk '{print $3}')
> +- _cpuid=$(( _cpuid ))
> +- _cpuid=$(printf "0x%08X" "$_cpuid")
> +- _date=$( echo "$_line" | awk '{print $6}' | tr -d
> '-')
> +- _version=$(echo "$_line" | awk '{print $8}')
> +- _version=$(( _version ))
> +- _version=$(printf "0x%08X" "$_version")
> +- _sqlstm="$(printf "INSERT INTO Intel
> (origin,cpuid,version,yyyymmdd) VALUES
> (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")"
> "$(printf "%08X" "$_version")" "$_date")"
> +- sqlite3 "$mcedb_tmp" "$_sqlstm"
> +- done
> +- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-
> Processor-Microcode-Data-Files-main/license" 2>/dev/null)
> +- if [ -n "$_intel_timestamp" ]; then
> +- # use this date, it matches the last commit date
> +- _intel_latest_date=$(date +%Y%m%d -d
> @"$_intel_timestamp")
> +- else
> +- echo "Falling back to the latest microcode date"
> +- _intel_latest_date=$(sqlite3 "$mcedb_tmp" "SELECT
> yyyymmdd from Intel WHERE origin = 'intel' ORDER BY yyyymmdd DESC
> LIMIT 1;")
> +- fi
> +- echo DONE "(version $_intel_latest_date)"
> +-
> +- dbversion="$mcedb_revision+i$_intel_latest_date"
> +-
> +- if [ "$1" != builtin ] && [ -n "$previous_dbversion" ] && [
> "$previous_dbversion" = "v$dbversion" ]; then
> +- echo "We already have this version locally, no update
> needed"
> +- return 0
> +- fi
> +-
> +- _info_nol "Building local database... "
> +- {
> +- echo "# Spectre & Meltdown Checker";
> +- echo "# %%% MCEDB v$dbversion";
> +- sqlite3 "$mcedb_tmp" "SELECT '#
> I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel
> AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
> +- sqlite3 "$mcedb_tmp" "SELECT '#
> A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD
> AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND
> t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid
> ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
> +- } > "$mcedb_cache"
> +- echo DONE "(version $dbversion)"
> +-
> +- if [ "$1" = builtin ]; then
> +- newfile=$(mktemp -t smc-builtin-XXXXXX)
> +- awk '/^# %%% MCEDB / { exit }; { print }' "$0" >
> "$newfile"
> +- awk '{ if (NR>1) { print } }' "$mcedb_cache" >>
> "$newfile"
> +- cat "$newfile" > "$0"
> +- rm -f "$newfile"
> +- fi
> +-}
> +-
> + parse_opt_file()
> + {
> + # parse_opt_file option_name option_value
> +@@ -1067,12 +922,15 @@ while [ -n "${1:-}" ]; do
> + # deprecated, kept for compatibility
> + opt_explain=0
> + shift
> +- elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb"
> ]; then
> +- update_fwdb
> +- exit $?
> +- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--
> update-builtin-mcedb" ]; then
> +- update_fwdb builtin
> +- exit $?
> ++ elif [ "$1" = "--with-fwdb" ] || [ "$1" = "--with-mcedb" ];
> then
> ++ opt_fwdb=$2
> ++ if [ -f "$opt_fwdb" ]; then
> ++ mcedb_cache=$2
> ++ else
> ++ echo "$0: error: --with-fwdb should be a
> file, got '$opt_fwdb'" >&2
> ++ exit 255
> ++ fi
> ++ shift 2
> + elif [ "$1" = "--dump-mock-data" ]; then
> + opt_mock=1
> + shift
> +@@ -2033,21 +1891,11 @@ is_xen_domU()
> + fi
> + }
> +
> +-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
> + if [ -r "$mcedb_cache" ]; then
> + # we have a local cache file, but it might be older than the
> builtin version we have
> + local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> +- # sort -V sorts by version number
> +- older_dbversion=$(printf "%b\n%b" "$local_dbversion"
> "$builtin_dbversion" | sort -V | head -n1)
> +- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
> +- mcedb_source="$mcedb_cache"
> +- mcedb_info="local firmwares DB $local_dbversion"
> +- fi
> +-fi
> +-# if mcedb_source is not set, either we don't have a local cached
> db, or it is older than the builtin db
> +-if [ -z "${mcedb_source:-}" ]; then
> +- mcedb_source="$0"
> +- mcedb_info="builtin firmwares DB $builtin_dbversion"
> ++ mcedb_source="$mcedb_cache"
> ++ mcedb_info="local firmwares DB $local_dbversion"
> + fi
> + read_mcedb()
> + {
> +@@ -2063,7 +1911,9 @@ is_latest_known_ucode()
> + return 2
> + fi
> + ucode_latest="latest microcode version for your CPU model is
> unknown"
> +- if is_intel; then
> ++ if [ -z "$mcedb_source" ]; then
> ++ return 2
> ++ elif is_intel; then
> + cpu_brand_prefix=I
> + elif is_amd; then
> + cpu_brand_prefix=A
> +--
> +2.38.1
> +
LGTM.
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-stage-
> commands-for-substitution.patch b/gnu/packages/patches/spectre-
> meltdown-checker-stage-commands-for-substitution.patch
> new file mode 100644
> index 0000000000..a8e7531f32
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-stage-commands-
> for-substitution.patch
> @@ -0,0 +1,1849 @@
> +From 1d79c223d5dc114f63da2c5061d2c713d8a05687 Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Fri, 11 Nov 2022 18:49:50 +0800
> +Subject: [PATCH 2/2] Stage commands for later substitution.
> +
> +awk, base64, basename, bunzip2, cat, cut, dd, dirname, dmesg, find,
> grep,
> +gunzip, gzip, head, id, lz4, lzop, mktemp, modprobe, mount, nm,
> nproc,
> +objdump, od, perl, pgrep, readelf, rm, rmmod, sed, sort, stat,
> strings,
> +sysctl, tr, umount, uname, unlzma, unxz, unzstd, uuencode, xargs.
> +---
I think it'd better to provide a little more information in the patch
note, e.g. "The following commands are taken from the environment and
thus need to be substituted:
- awk
- base64
- basename
- ...
The following are shell built-ins and can remain as is
- command
- echo
- ..."
By the way, I feel like it'd be an improvement to crank down on the
number of context lines or translate this into an equivalent
substitute*, i.e.
(substitute* "spectre-meltdown-checker.sh"
(("\\<(awk|base64|...)\\>" all cmd)
(find-command inputs cmd))
(("\\<(gzip|gunzip|...)\\>" all cmd)
(find-command inputs cmd))
...)
where
(define* (find-command inputs cmd #:optional (bin "bin"))
(search-input-file inputs (string-append bin "/" cmd)))
> + spectre-meltdown-checker.sh | 606 ++++++++++++++++++---------------
> ---
> + 1 file changed, 303 insertions(+), 303 deletions(-)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index ce46970..4889ebb 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -19,31 +19,31 @@ trap '_warn "interrupted, cleaning up...";
> exit_cleanup; exit 1' INT
> + exit_cleanup()
> + {
> + # cleanup the temp decompressed config & kernel image
> +- [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm
> -f "$dumped_config"
> +- [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm
> -f "$kerneltmp"
> +- [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm
> -f "$kerneltmp2"
> +- [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug
> 2>/dev/null
> +- [ "${mounted_procfs:-}" = 1 ] && umount "$procfs"
> 2>/dev/null
> +- [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
> +- [ "${insmod_msr:-}" = 1 ] && rmmod msr 2>/dev/null
> ++ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] &&
> @rm@ -f "$dumped_config"
> ++ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] &&
> @rm@ -f "$kerneltmp"
> ++ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] &&
> @rm@ -f "$kerneltmp2"
> ++ [ "${mounted_debugfs:-}" = 1 ] && @umount@ /sys/kernel/debug
> 2>/dev/null
> ++ [ "${mounted_procfs:-}" = 1 ] && @umount@ "$procfs"
> 2>/dev/null
> ++ [ "${insmod_cpuid:-}" = 1 ] && @rmmod@ cpuid 2>/dev/null
> ++ [ "${insmod_msr:-}" = 1 ] && @rmmod@ msr 2>/dev/null
> + [ "${kldload_cpuctl:-}" = 1 ] && kldunload cpuctl
> 2>/dev/null
> + [ "${kldload_vmm:-}" = 1 ] && kldunload vmm
> 2>/dev/null
> + }
> +
> + # if we were git clone'd, adjust VERSION
> +-if [ -d "$(dirname "$0")/.git" ] && command -v git >/dev/null 2>&1;
> then
> +- describe=$(git -C "$(dirname "$0")" describe --tags --dirty
> 2>/dev/null)
> +- [ -n "$describe" ] && VERSION=$(echo "$describe" | sed -e
> s/^v//)
> ++if [ -d "$(@dirname@ "$0")/.git" ] && command -v git >/dev/null
> 2>&1; then
> ++ describe=$(git -C "$(@dirname@ "$0")" describe --tags --dirty
> 2>/dev/null)
> ++ [ -n "$describe" ] && VERSION=$(echo "$describe" | @sed@ -e
> s/^v//)
> + fi
> +
> + show_usage()
> + {
> + # shellcheck disable=SC2086
> +- cat <<EOF
> ++ @cat@ <<EOF
> + Usage:
> +- Live mode (auto): $(basename $0) [options]
> +- Live mode (manual): $(basename $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
> +- Offline mode: $(basename $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
> ++ Live mode (auto): $(@basename@ $0) [options]
> ++ Live mode (manual): $(@basename@ $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]> --live
> ++ Offline mode: $(@basename@ $0) [options] <[--
> kernel <kimage>] [--config <kconfig>] [--map <mapfile>]>
> +
> + Modes:
> + Two modes are available.
> +@@ -106,7 +106,7 @@ EOF
> +
> + show_disclaimer()
> + {
> +- cat <<EOF
> ++ @cat@ <<EOF
> + Disclaimer:
> +
> + This tool does its best to determine whether your system is immune
> (or has proper mitigations in place) for the
> +@@ -134,7 +134,7 @@ This tool has been released in the hope that
> it'll be useful, but don't use it t
> + EOF
> + }
> +
> +-os=$(uname -s)
> ++os=$(@uname@ -s)
> +
> + # parse options
> + opt_kernel=''
> +@@ -203,7 +203,7 @@ __echo()
> + _interpret_chars='-e'
> + fi
> + _ctrlchar=$($echo_cmd $_interpret_chars "\033")
> +- _msg=$($echo_cmd $_interpret_chars "$_msg" | sed -r
> "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
> ++ _msg=$($echo_cmd $_interpret_chars "$_msg" | @sed@ -r
> "s/$_ctrlchar\[([0-9][0-9]?(;[0-9][0-9]?)?)?m//g")
> + fi
> + if [ "$echo_cmd_type" = printf ]; then
> + if [ "$opt" = "-n" ]; then
> +@@ -379,7 +379,7 @@ is_cpu_affected()
> + # https://github.com/crozone/SpectrePoC/issues/1 ^F
> E5200 => spectre 2 not affected
> + #
> https://github.com/paboldin/meltdown-exploit/issues/19 ^F E5200 =>
> meltdown affected
> + # model name : Pentium(R) Dual-Core CPU E5200
> @ 2.50GHz
> +- if echo "$cpu_friendly_name" | grep -qE 'Pentium\(R\)
> Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
> ++ if echo "$cpu_friendly_name" | @grep@ -qE
> 'Pentium\(R\) Dual-Core[[:space:]]+CPU[[:space:]]+E[0-9]{4}K?'; then
> + variant1=vuln
> + [ -z "$variant2" ] && variant2=immune
> + variant3=vuln
> +@@ -482,7 +482,7 @@ is_cpu_affected()
> + i=$(( i + 1 ))
> + # do NOT quote $cpu_arch_list below
> + # shellcheck disable=SC2086
> +- cpuarch=$(echo $cpu_arch_list | awk '{ print
> $'$i' }')
> ++ cpuarch=$(echo $cpu_arch_list | @awk@ '{
> print $'$i' }')
> + _debug "checking cpu$i: <$cpupart>
> <$cpuarch>"
> + # some kernels report AArch64 instead of 8
> + [ "$cpuarch" = "AArch64" ] && cpuarch=8
> +@@ -493,49 +493,49 @@ is_cpu_affected()
> + # part ? ? c08 c09 c0d c0f c0e d07
> d08 d09 d0a d0b d0c d0d
> + # arch 7? 7? 7 7 7 7 7 8
> 8 8 8 8 8 8
> + #
> +- # Whitelist identified non-affected
> processors, use vulnerability information from
> ++ # Whitelist identified non-affected
> processors, use vulnerability information from
> + #
> https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
> + # Partnumbers can be found here:
> + #
> https://github.com/gcc-mirror/gcc/blob/master/gcc/config/arm/arm-cpus.in
> + #
> + # Maintain cumulative check of
> vulnerabilities -
> + # if at least one of the cpu is
> affected, then the system is affected
> +- if [ "$cpuarch" = 7 ] && echo
> "$cpupart" | grep -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
> ++ if [ "$cpuarch" = 7 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xc08 -e 0xc09 -e 0xc0d -e 0xc0e; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + [ -z "$variant4" ] &&
> variant4=immune
> + _debug "checking cpu$i: armv7
> A8/A9/A12/A17 non affected to variants 3, 3a & 4"
> +- elif [ "$cpuarch" = 7 ] && echo
> "$cpupart" | grep -q -w -e 0xc0f; then
> ++ elif [ "$cpuarch" = 7 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xc0f; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + variant3a=vuln
> + [ -z "$variant4" ] &&
> variant4=immune
> + _debug "checking cpu$i: armv7
> A15 non affected to variants 3 & 4"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd07 -e 0xd08; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd07 -e 0xd08; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + variant3a=vuln
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A57/A72 non affected to variants 3"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd09; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd09; then
> + variant1=vuln
> + variant2=vuln
> + [ -z "$variant3" ] &&
> variant3=immune
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A73 non affected to variants 3 & 3a"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd0a; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd0a; then
> + variant1=vuln
> + variant2=vuln
> + variant3=vuln
> + [ -z "$variant3a" ] &&
> variant3a=immune
> + variant4=vuln
> + _debug "checking cpu$i: armv8
> A75 non affected to variant 3a"
> +- elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | grep -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
> ++ elif [ "$cpuarch" = 8 ] && echo
> "$cpupart" | @grep@ -q -w -e 0xd0b -e 0xd0c -e 0xd0d; then
> + variant1=vuln
> + [ -z "$variant2" ] &&
> variant2=immune
> + [ -z "$variant3" ] &&
> variant3=immune
> +@@ -816,7 +816,7 @@ is_cpu_ssb_free()
> + if [ "$cpu_family" = "18" ] || \
> + [ "$cpu_family" = "17" ] || \
> + [ "$cpu_family" = "16" ] || \
> +- [ "$cpu_family" = "15" ]; then
> ++ [ "$cpu_family" = "15" ]; then
> + return 0
> + fi
> + fi
> +@@ -910,7 +910,7 @@ while [ -n "${1:-}" ]; do
> + elif [ "$1" = "--cpu" ]; then
> + opt_cpu=$2
> + if [ "$opt_cpu" != all ]; then
> +- if echo "$opt_cpu" | grep -Eq '^[0-9]+'; then
> ++ if echo "$opt_cpu" | @grep@ -Eq '^[0-9]+';
> then
> + opt_cpu=$(( opt_cpu ))
> + else
> + echo "$0: error: --cpu should be an
> integer or 'all', got '$opt_cpu'" >&2
> +@@ -961,7 +961,7 @@ while [ -n "${1:-}" ]; do
> + echo "$0: error: option --cve expects a
> parameter, supported CVEs are: $supported_cve_list" >&2
> + exit 255
> + fi
> +- selected_cve=$(echo "$supported_cve_list" | grep -iwo
> "$2")
> ++ selected_cve=$(echo "$supported_cve_list" | @grep@ -
> iwo "$2")
> + if [ -n "$selected_cve" ]; then
> + opt_cve_list="$opt_cve_list $selected_cve"
> + opt_cve_all=0
> +@@ -1166,14 +1166,14 @@ check_kernel()
> + # a damaged ELF file and validate it, check for stderr
> warnings too
> +
> + # the warning "readelf: Warning: [16]: Link field (0) should
> index a symtab section./" can appear on valid kernels, ignore it
> +- _readelf_warnings=$("${opt_arch_prefix}readelf" -S "$_file"
> 2>&1 >/dev/null | grep -v 'should index a symtab section' | tr "\n"
> "/"); ret=$?
> +- _readelf_sections=$("${opt_arch_prefix}readelf" -S "$_file"
> 2>/dev/null | grep -c -e data -e text -e init)
> +- _kernel_size=$(stat -c %s "$_file" 2>/dev/null || stat -f %z
> "$_file" 2>/dev/null || echo 10000)
> ++ _readelf_warnings=$("@readelf@" -S "$_file" 2>&1 >/dev/null |
> @grep@ -v 'should index a symtab section' | @tr@ "\n" "/"); ret=$?
> ++ _readelf_sections=$("@readelf@" -S "$_file" 2>/dev/null |
> @grep@ -c -e data -e text -e init)
> ++ _kernel_size=$(@stat@ -c %s "$_file" 2>/dev/null || @stat@ -f
> %z "$_file" 2>/dev/null || echo 10000)
> + _debug "check_kernel: ret=$? size=$_kernel_size
> sections=$_readelf_sections warnings=$_readelf_warnings"
> + if [ "$_mode" = desperate ]; then
> +- if "${opt_arch_prefix}strings" "$_file" | grep -Eq
> '^Linux version '; then
> ++ if "@strings@" "$_file" | @grep@ -Eq '^Linux version
> '; then
> + _debug "check_kernel (desperate): ...
> matched!"
> +- if [ "$_readelf_sections" = 0 ] && grep -qF -
> e armv6 -e armv7 "$_file"; then
> ++ if [ "$_readelf_sections" = 0 ] && @grep@ -qF
> -e armv6 -e armv7 "$_file"; then
> + _debug "check_kernel (desperate): raw
> arm binary found, adjusting objdump options"
> + objdump_options="-D -b binary -marm"
> + else
> +@@ -1206,7 +1206,7 @@ try_decompress()
> +
> + # Try to find the header ($1) and decompress from here
> + _debug "try_decompress: looking for $3 magic in $6"
> +- for pos in $(tr "$1\n$2" "\n$2=" < "$6" | grep -abo
> "^$2")
> ++ for pos in $(@tr@ "$1\n$2" "\n$2=" < "$6" | @grep@ -abo
> "^$2")
> + do
> + _debug "try_decompress: magic for $3 found at offset
> $pos"
> + if ! command -v "$3" >/dev/null 2>&1; then
> +@@ -1233,11 +1233,11 @@ try_decompress()
> + kernel="$kerneltmp"
> + _debug "try_decompress: decompressed with $3
> successfully!"
> + return 0
> +- elif [ "$3" != "cat" ]; then
> ++ elif [ "$3" != "@cat@" ]; then
> + _debug "try_decompress: decompression with $3
> worked but result is not a kernel, trying with an offset"
> +- [ -z "$kerneltmp2" ] && kerneltmp2=$(mktemp -
> t smc-kernel-XXXXXX)
> +- cat "$kerneltmp" > "$kerneltmp2"
> +- try_decompress '\177ELF' xxy 'cat' '' cat
> "$kerneltmp2" && return 0
> ++ [ -z "$kerneltmp2" ] && kerneltmp2=$(@mktemp@
> -t smc-kernel-XXXXXX)
> ++ @cat@ "$kerneltmp" > "$kerneltmp2"
> ++ try_decompress '\177ELF' xxy '@cat@' '' cat
> "$kerneltmp2" && return 0
> + else
> + _debug "try_decompress: decompression with $3
> worked but result is not a kernel"
> + fi
> +@@ -1249,12 +1249,12 @@ extract_kernel()
> + {
> + [ -n "${1:-}" ] || return 1
> + # Prepare temp files:
> +- kerneltmp="$(mktemp -t smc-kernel-XXXXXX)"
> ++ kerneltmp="$(@mktemp@ -t smc-kernel-XXXXXX)"
> +
> + # Initial attempt for uncompressed images or objects:
> + if check_kernel "$1"; then
> + _debug "extract_kernel: found kernel is valid, no
> decompression needed"
> +- cat "$1" > "$kerneltmp"
> ++ @cat@ "$1" > "$kerneltmp"
> + kernel=$kerneltmp
> + return 0
> + fi
> +@@ -1263,14 +1263,14 @@ extract_kernel()
> + for pass in 1 2; do
> + for mode in normal desperate; do
> + _debug "extract_kernel: pass $pass $mode
> mode"
> +- try_decompress '\037\213\010' xy
> gunzip '' gunzip "$1" "$mode" "$pass" && return 0
> +- try_decompress '\002\041\114\030' xyy
> 'lz4' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
> +- try_decompress '\3757zXZ\000' abcde
> unxz '' xz-utils "$1" "$mode" "$pass" && return 0
> +- try_decompress 'BZh' xy
> bunzip2 '' bzip2 "$1" "$mode" "$pass" && return 0
> +- try_decompress '\135\0\0\0' xxx
> unlzma '' xz-utils "$1" "$mode" "$pass" && return 0
> +- try_decompress '\211\114\132' xy
> 'lzop' '-d' lzop "$1" "$mode" "$pass" && return 0
> +- try_decompress '\177ELF' xxy
> 'cat' '' cat "$1" "$mode" "$pass" && return 0
> +- try_decompress '(\265/\375' xxy
> unzstd '' zstd "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\037\213\010' xy
> @gunzip@ '' gunzip "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\002\041\114\030' xyy
> '@lz4@' '-d -l' liblz4-tool "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\3757zXZ\000' abcde
> @unxz@ '' xz-utils "$1" "$mode" "$pass" && return 0
> ++ try_decompress 'BZh' xy
> @bunzip2@ '' bzip2 "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\135\0\0\0' xxx
> @unlzma@ '' xz-utils "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\211\114\132' xy
> '@lzop@' '-d' lzop "$1" "$mode" "$pass" && return 0
> ++ try_decompress '\177ELF' xxy
> '@cat@' '' cat "$1" "$mode" "$pass" && return 0
> ++ try_decompress '(\265/\375' xxy
> @unzstd@ '' zstd "$1" "$mode" "$pass" && return 0
> + done
> + done
> + # kernel_err might already have been populated by
> try_decompress() if we're missing one of the tools
> +@@ -1287,7 +1287,7 @@ mount_debugfs()
> + {
> + if [ ! -e /sys/kernel/debug/sched_features ]; then
> + # try to mount the debugfs hierarchy ourselves and
> remember it to umount afterwards
> +- mount -t debugfs debugfs /sys/kernel/debug
> 2>/dev/null && mounted_debugfs=1
> ++ @mount@ -t debugfs debugfs /sys/kernel/debug
> 2>/dev/null && mounted_debugfs=1
> + fi
> + }
> +
> +@@ -1298,12 +1298,12 @@ load_msr()
> + load_msr_once=1
> +
> + if [ "$os" = Linux ]; then
> +- if ! grep -qw msr "$procfs/modules" 2>/dev/null; then
> +- modprobe msr 2>/dev/null && insmod_msr=1
> ++ if ! @grep@ -qw msr "$procfs/modules" 2>/dev/null;
> then
> ++ @modprobe@ msr 2>/dev/null && insmod_msr=1
> + _debug "attempted to load module msr,
> insmod_msr=$insmod_msr"
> + else
> + _debug "msr module already loaded"
> +- fi
> ++ fi
> + else
> + if ! kldstat -q -m cpuctl; then
> + kldload cpuctl 2>/dev/null &&
> kldload_cpuctl=1
> +@@ -1321,12 +1321,12 @@ load_cpuid()
> + load_cpuid_once=1
> +
> + if [ "$os" = Linux ]; then
> +- if ! grep -qw cpuid "$procfs/modules" 2>/dev/null;
> then
> +- modprobe cpuid 2>/dev/null && insmod_cpuid=1
> ++ if ! @grep@ -qw cpuid "$procfs/modules" 2>/dev/null;
> then
> ++ @modprobe@ cpuid 2>/dev/null &&
> insmod_cpuid=1
> + _debug "attempted to load module cpuid,
> insmod_cpuid=$insmod_cpuid"
> + else
> + _debug "cpuid module already loaded"
> +- fi
> ++ fi
> + else
> + if ! kldstat -q -m cpuctl; then
> + kldload cpuctl 2>/dev/null &&
> kldload_cpuctl=1
> +@@ -1415,7 +1415,7 @@ read_cpuid_one_core()
> + fi
> + # on some kernel versions, /dev/cpu/0/cpuid doesn't
> imply that the cpuid module is loaded, in that case dd returns an
> error,
> + # we use that fact to load the module if dd returns
> an error
> +- if ! dd if=/dev/cpu/0/cpuid bs=16 count=1 >/dev/null
> 2>&1; then
> ++ if ! @dd@ if=/dev/cpu/0/cpuid bs=16 count=1
> >/dev/null 2>&1; then
> + load_cpuid
> + fi
> + # we need _leaf to be converted to decimal for dd
> +@@ -1426,14 +1426,14 @@ read_cpuid_one_core()
> + _ddskip=$(( _position / 16 ))
> + _odskip=$(( _position - _ddskip * 16 ))
> + # now read the value
> +- _cpuid=$(dd if="/dev/cpu/$_core/cpuid" bs=16
> skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | od -j $((_odskip *
> 16)) -A n -t u4)
> ++ _cpuid=$(@dd@ if="/dev/cpu/$_core/cpuid" bs=16
> skip=$_ddskip count=$((_odskip + 1)) 2>/dev/null | @od@ -j $((_odskip
> * 16)) -A n -t u4)
> + elif [ -e /dev/cpuctl0 ]; then
> + # BSD
> + if [ ! -r /dev/cpuctl0 ]; then
> + read_cpuid_msg="Couldn't read cpuid info from
> cpuctl"
> + return $READ_CPUID_RET_ERR
> + fi
> +- _cpuid=$(cpucontrol -i "$_leaf","$_subleaf"
> "/dev/cpuctl$_core" 2>/dev/null | cut -d: -f2-)
> ++ _cpuid=$(cpucontrol -i "$_leaf","$_subleaf"
> "/dev/cpuctl$_core" 2>/dev/null | @cut@ -d: -f2-)
> + # cpuid level 0x4, level_type 0x2: 0x1c004143
> 0x01c0003f 0x000001ff 0x00000000
> + else
> + read_cpuid_msg="Found no way to read cpuid info"
> +@@ -1456,7 +1456,7 @@ read_cpuid_one_core()
> + fi
> +
> + # get the value of the register we want
> +- _reg=$(echo "$_cpuid" | awk '{print $'"$_register"'}')
> ++ _reg=$(echo "$_cpuid" | @awk@ '{print $'"$_register"'}')
> + # Linux returns it as decimal, BSD as hex, normalize to
> decimal
> + _reg=$(( _reg ))
> + # shellcheck disable=SC2046
> +@@ -1484,11 +1484,11 @@ dmesg_grep()
> + # grep for something in dmesg, ensuring that the dmesg buffer
> + # has not been truncated
> + dmesg_grepped=''
> +- if ! dmesg | grep -qE -e '(^|\] )Linux version [0-9]' -e
> '^FreeBSD is a registered' ; then
> ++ if ! @dmesg@ | @grep@ -qE -e '(^|\] )Linux version [0-9]' -e
> '^FreeBSD is a registered' ; then
> + # dmesg truncated
> + return 2
> + fi
> +- dmesg_grepped=$(dmesg | grep -E "$1" | head -1)
> ++ dmesg_grepped=$(@dmesg@ | @grep@ -E "$1" | @head@ -1)
> + # not found:
> + [ -z "$dmesg_grepped" ] && return 1
> + # found, output is in $dmesg_grepped
> +@@ -1505,12 +1505,12 @@ parse_cpu_details()
> + {
> + [ "${parse_cpu_details_done:-}" = 1 ] && return 0
> +
> +- if command -v nproc >/dev/null; then
> +- number_of_cores=$(nproc)
> +- elif echo "$os" | grep -q BSD; then
> +- number_of_cores=$(sysctl -n hw.ncpu 2>/dev/null ||
> echo 1)
> ++ if command -v @nproc@ >/dev/null; then
> ++ number_of_cores=$(@nproc@)
> ++ elif echo "$os" | @grep@ -q BSD; then
> ++ number_of_cores=$(@sysctl@ -n hw.ncpu 2>/dev/null ||
> echo 1)
> + elif [ -e "$procfs/cpuinfo" ]; then
> +- number_of_cores=$(grep -c ^processor
> "$procfs/cpuinfo" 2>/dev/null || echo 1)
> ++ number_of_cores=$(@grep@ -c ^processor
> "$procfs/cpuinfo" 2>/dev/null || echo 1)
> + else
> + # if we don't know, default to 1 CPU
> + number_of_cores=1
> +@@ -1518,43 +1518,43 @@ parse_cpu_details()
> + max_core_id=$(( number_of_cores - 1 ))
> +
> + if [ -e "$procfs/cpuinfo" ]; then
> +- cpu_vendor=$( grep '^vendor_id' "$procfs/cpuinfo" |
> awk '{print $3}' | head -1)
> +- cpu_friendly_name=$(grep '^model name'
> "$procfs/cpuinfo" | cut -d: -f2- | head -1 | sed -e 's/^ *//')
> ++ cpu_vendor=$( @grep@ '^vendor_id' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @head@ -1)
> ++ cpu_friendly_name=$(@grep@ '^model name'
> "$procfs/cpuinfo" | @cut@ -d: -f2- | @head@ -1 | @sed@ -e 's/^ *//')
> + # special case for ARM follows
> +- if grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
> ++ if @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x41' "$procfs/cpuinfo"; then
> + cpu_vendor='ARM'
> + # some devices (phones or other) have several
> ARMs and as such different part numbers,
> + # an example is "bigLITTLE", so we need to
> store the whole list, this is needed for is_cpu_affected
> +- cpu_part_list=$(awk '/CPU part/
> {print $4}' "$procfs/cpuinfo")
> +- cpu_arch_list=$(awk '/CPU architecture/
> {print $3}' "$procfs/cpuinfo")
> ++ cpu_part_list=$(@awk@ '/CPU part/
> {print $4}' "$procfs/cpuinfo")
> ++ cpu_arch_list=$(@awk@ '/CPU architecture/
> {print $3}' "$procfs/cpuinfo")
> + # take the first one to fill the friendly
> name, do NOT quote the vars below
> + # shellcheck disable=SC2086
> +- cpu_arch=$(echo $cpu_arch_list | awk '{ print
> $1 }')
> ++ cpu_arch=$(echo $cpu_arch_list | @awk@ '{
> print $1 }')
> + # shellcheck disable=SC2086
> +- cpu_part=$(echo $cpu_part_list | awk '{ print
> $1 }')
> ++ cpu_part=$(echo $cpu_part_list | @awk@ '{
> print $1 }')
> + [ "$cpu_arch" = "AArch64" ] && cpu_arch=8
> + cpu_friendly_name="ARM"
> + [ -n "$cpu_arch" ] &&
> cpu_friendly_name="$cpu_friendly_name v$cpu_arch"
> + [ -n "$cpu_part" ] &&
> cpu_friendly_name="$cpu_friendly_name model $cpu_part"
> +
> +- elif grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
> ++ elif @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x43' "$procfs/cpuinfo"; then
> + cpu_vendor='CAVIUM'
> +- elif grep -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
> ++ elif @grep@ -qi 'CPU
> implementer[[:space:]]*:[[:space:]]*0x70' "$procfs/cpuinfo"; then
> + cpu_vendor='PHYTIUM'
> + fi
> +
> +- cpu_family=$( grep '^cpu family' "$procfs/cpuinfo" |
> awk '{print $4}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_model=$( grep '^model' "$procfs/cpuinfo" |
> awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_stepping=$(grep '^stepping' "$procfs/cpuinfo" |
> awk '{print $3}' | grep -E '^[0-9]+$' | head -1)
> +- cpu_ucode=$( grep '^microcode' "$procfs/cpuinfo" |
> awk '{print $3}' | head -1)
> ++ cpu_family=$( @grep@ '^cpu family' "$procfs/cpuinfo"
> | @awk@ '{print $4}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_model=$( @grep@ '^model' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_stepping=$(@grep@ '^stepping' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @grep@ -E '^[0-9]+$' | @head@ -1)
> ++ cpu_ucode=$( @grep@ '^microcode' "$procfs/cpuinfo"
> | @awk@ '{print $3}' | @head@ -1)
> + else
> +- cpu_vendor=$( dmesg | grep -i -m1 'Origin=' | cut -f2
> -w | cut -f2 -d= | cut -f2 -d\" )
> +- cpu_family=$( dmesg | grep -i -m1 'Family=' | cut -f4
> -w | cut -f2 -d= )
> ++ cpu_vendor=$( @dmesg@ | @grep@ -i -m1 'Origin=' |
> @cut@ -f2 -w | @cut@ -f2 -d= | @cut@ -f2 -d\" )
> ++ cpu_family=$( @dmesg@ | @grep@ -i -m1 'Family=' |
> @cut@ -f4 -w | @cut@ -f2 -d= )
> + cpu_family=$(( cpu_family ))
> +- cpu_model=$( dmesg | grep -i -m1 'Model=' | cut -f5 -
> w | cut -f2 -d= )
> ++ cpu_model=$( @dmesg@ | @grep@ -i -m1 'Model=' | @cut@
> -f5 -w | @cut@ -f2 -d= )
> + cpu_model=$(( cpu_model ))
> +- cpu_stepping=$( dmesg | grep -i -m1 'Stepping=' | cut
> -f6 -w | cut -f2 -d= )
> +- cpu_friendly_name=$(sysctl -n hw.model 2>/dev/null)
> ++ cpu_stepping=$( @dmesg@ | @grep@ -i -m1 'Stepping=' |
> @cut@ -f6 -w | @cut@ -f2 -d= )
> ++ cpu_friendly_name=$(@sysctl@ -n hw.model 2>/dev/null)
> + fi
> +
> + if [ -n "${SMC_MOCK_CPU_FRIENDLY_NAME:-}" ]; then
> +@@ -1609,7 +1609,7 @@ parse_cpu_details()
> + # call CPUID
> + cpucontrol -i 1 /dev/cpuctl0 >/dev/null
> + # read MSR
> +- cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 |
> awk '{print $3}')
> ++ cpu_ucode=$(cpucontrol -m 0x8b /dev/cpuctl0 |
> @awk@ '{print $3}')
> + # convert to decimal
> + cpu_ucode=$(( cpu_ucode ))
> + # convert back to hex
> +@@ -1628,7 +1628,7 @@ parse_cpu_details()
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_CPU_UCODE='$cpu_ucode'")
> + fi
> +
> +- echo "$cpu_ucode" | grep -q ^0x && cpu_ucode=$(( cpu_ucode ))
> ++ echo "$cpu_ucode" | @grep@ -q ^0x && cpu_ucode=$(( cpu_ucode
> ))
> + ucode_found=$(printf "family 0x%x model 0x%x stepping 0x%x
> ucode 0x%x cpuid 0x%x" "$cpu_family" "$cpu_model" "$cpu_stepping"
> "$cpu_ucode" "$cpu_cpuid")
> +
> + # also define those that we will need in other funcs
> +@@ -1725,8 +1725,8 @@ is_cpu_smt_enabled()
> + {
> + # SMT / HyperThreading is enabled if siblings != cpucores
> + if [ -e "$procfs/cpuinfo" ]; then
> +- _siblings=$(awk '/^siblings/ {print $3;exit}'
> "$procfs/cpuinfo")
> +- _cpucores=$(awk '/^cpu cores/ {print $4;exit}'
> "$procfs/cpuinfo")
> ++ _siblings=$(@awk@ '/^siblings/ {print $3;exit}'
> "$procfs/cpuinfo")
> ++ _cpucores=$(@awk@ '/^cpu cores/ {print $4;exit}'
> "$procfs/cpuinfo")
> + if [ -n "$_siblings" ] && [ -n "$_cpucores" ]; then
> + if [ "$_siblings" = "$_cpucores" ]; then
> + return 1
> +@@ -1774,10 +1774,10 @@ is_ucode_blacklisted()
> + $INTEL_FAM6_SANDYBRIDGE_X,0x06,0x61b \
> + $INTEL_FAM6_SANDYBRIDGE_X,0x07,0x712
> + do
> +- model=$(echo "$tuple" | cut -d, -f1)
> +- stepping=$(( $(echo "$tuple" | cut -d, -f2) ))
> ++ model=$(echo "$tuple" | @cut@ -d, -f1)
> ++ stepping=$(( $(echo "$tuple" | @cut@ -d, -f2) ))
> + if [ "$cpu_model" = "$model" ] && [ "$cpu_stepping" =
> "$stepping" ]; then
> +- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
> ++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
> + if [ "$cpu_ucode" = "$ucode" ]; then
> + _debug "is_ucode_blacklisted: we have
> a match! ($cpu_model/$cpu_stepping/$cpu_ucode)"
> + return 0
> +@@ -1865,7 +1865,7 @@ is_xen_dom0()
> + return 1
> + fi
> +
> +- if [ -e "$procfs/xen/capabilities" ] && grep -q "control_d"
> "$procfs/xen/capabilities"; then
> ++ if [ -e "$procfs/xen/capabilities" ] && @grep@ -q "control_d"
> "$procfs/xen/capabilities"; then
> + return 0
> + else
> + return 1
> +@@ -1893,13 +1893,13 @@ is_xen_domU()
> +
> + if [ -r "$mcedb_cache" ]; then
> + # we have a local cache file, but it might be older than the
> builtin version we have
> +- local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> ++ local_dbversion=$( @awk@ '/^# %%% MCEDB / { print $4 }'
> "$mcedb_cache")
> + mcedb_source="$mcedb_cache"
> + mcedb_info="local firmwares DB $local_dbversion"
> + fi
> + read_mcedb()
> + {
> +- awk '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / { DELIM=1
> }' "$mcedb_source"
> ++ @awk@ '{ if (DELIM==1) { print $2 } } /^# %%% MCEDB / {
> DELIM=1 }' "$mcedb_source"
> + }
> +
> + is_latest_known_ucode()
> +@@ -1920,10 +1920,10 @@ is_latest_known_ucode()
> + else
> + return 2
> + fi
> +- for tuple in $(read_mcedb | grep "$(printf
> "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
> ++ for tuple in $(read_mcedb | @grep@ "$(printf
> "^$cpu_brand_prefix,0x%08X," "$cpu_cpuid")")
> + do
> +- ucode=$(( $(echo "$tuple" | cut -d, -f3) ))
> +- ucode_date=$(echo "$tuple" | cut -d, -f4 | sed -r
> 's=(....)(..)(..)=\1/\2/\3=')
> ++ ucode=$(( $(echo "$tuple" | @cut@ -d, -f3) ))
> ++ ucode_date=$(echo "$tuple" | @cut@ -d, -f4 | @sed@ -r
> 's=(....)(..)(..)=\1/\2/\3=')
> + _debug "is_latest_known_ucode: with cpuid $cpu_cpuid
> has ucode $cpu_ucode, last known is $ucode from $ucode_date"
> + ucode_latest=$(printf "latest version is 0x%x dated
> $ucode_date according to $mcedb_info" "$ucode")
> + if [ "$cpu_ucode" -ge "$ucode" ]; then
> +@@ -1948,7 +1948,7 @@ get_cmdline()
> + kernel_cmdline="$SMC_MOCK_CMDLINE"
> + return
> + else
> +- kernel_cmdline=$(cat "$procfs/cmdline")
> ++ kernel_cmdline=$(@cat@ "$procfs/cmdline")
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_CMDLINE='$kernel_cmdline'")
> + fi
> + }
> +@@ -1956,7 +1956,7 @@ get_cmdline()
> + # ENTRYPOINT
> +
> + # we can't do anything useful under WSL
> +-if uname -a | grep -qE -- '-Microsoft #[0-9]+-Microsoft '; then
> ++if @uname@ -a | @grep@ -qE -- '-Microsoft #[0-9]+-Microsoft '; then
> + _warn "This script doesn't work under Windows Subsystem for
> Linux"
> + _warn "You should use the official Microsoft tool instead."
> + _warn "It can be found under
> https://aka.ms/SpeculationControlPS"
> +@@ -2005,15 +2005,15 @@ fi
> +
> + # if we're under a BSD, try to mount linprocfs for
> "$procfs/cpuinfo"
> + procfs=/proc
> +-if echo "$os" | grep -q BSD; then
> ++if echo "$os" | @grep@ -q BSD; then
> + _debug "We're under BSD, check if we have procfs"
> +- procfs=$(mount | awk '/^linprocfs/ { print $3; exit; }')
> ++ procfs=$(@mount@ | @awk@ '/^linprocfs/ { print $3; exit; }')
> + if [ -z "$procfs" ]; then
> + _debug "we don't, try to mount it"
> + procfs=/proc
> + [ -d /compat/linux/proc ] &&
> procfs=/compat/linux/proc
> + test -d $procfs || mkdir $procfs
> +- if mount -t linprocfs linprocfs $procfs 2>/dev/null;
> then
> ++ if @mount@ -t linprocfs linprocfs $procfs
> 2>/dev/null; then
> + mounted_procfs=1
> + _debug "procfs just mounted at $procfs"
> + else
> +@@ -2045,14 +2045,14 @@ fi
> +
> + if [ "$opt_live" = 1 ]; then
> + # root check (only for live mode, for offline mode, we
> already checked if we could read the files)
> +- if [ "$(id -u)" -ne 0 ]; then
> ++ if [ "$(@id@ -u)" -ne 0 ]; then
> + _warn "Note that you should launch this script with
> root privileges to get accurate information."
> + _warn "We'll proceed but you might see permission
> denied errors."
> + _warn "To run it as root, you can try the following
> command: sudo $0"
> + _warn
> + fi
> + _info "Checking for vulnerabilities on current system"
> +- _info "Kernel is \033[35m$os $(uname -r) $(uname -v) $(uname
> -m)\033[0m"
> ++ _info "Kernel is \033[35m$os $(@uname@ -r) $(@uname@ -v)
> $(@uname@ -m)\033[0m"
> + _info "CPU is \033[35m$cpu_friendly_name\033[0m"
> +
> + # try to find the image of the current running kernel
> +@@ -2060,12 +2060,12 @@ if [ "$opt_live" = 1 ]; then
> + # specified by user on cmdline, with --live, don't
> override
> + :
> + # first, look for the BOOT_IMAGE hint in the kernel cmdline
> +- elif echo "$kernel_cmdline" | grep -q 'BOOT_IMAGE='; then
> +- opt_kernel=$(echo "$kernel_cmdline" | grep -Eo
> 'BOOT_IMAGE=[^ ]+' | cut -d= -f2)
> ++ elif echo "$kernel_cmdline" | @grep@ -q 'BOOT_IMAGE='; then
> ++ opt_kernel=$(echo "$kernel_cmdline" | @grep@ -Eo
> 'BOOT_IMAGE=[^ ]+' | @cut@ -d= -f2)
> + _debug "found opt_kernel=$opt_kernel in
> $procfs/cmdline"
> + # if the boot partition is within a btrfs subvolume,
> strip the subvolume name
> + # if /boot is a separate subvolume, the remainder of
> the code in this section should handle it
> +- if echo "$opt_kernel" | grep -q "^/@"; then
> opt_kernel=$(echo "$opt_kernel" | sed "s:/@[^/]*::"); fi
> ++ if echo "$opt_kernel" | @grep@ -q "^/@"; then
> opt_kernel=$(echo "$opt_kernel" | @sed@ "s:/@[^/]*::"); fi
> + # if we have a dedicated /boot partition, our
> bootloader might have just called it /
> + # so try to prepend /boot and see if we find anything
> + [ -e "/boot/$opt_kernel" ] &&
> opt_kernel="/boot/$opt_kernel"
> +@@ -2077,7 +2077,7 @@ if [ "$opt_live" = 1 ]; then
> + # if we didn't find a kernel, default to guessing
> + if [ ! -e "$opt_kernel" ]; then
> + # Fedora:
> +- [ -e "/lib/modules/$(uname -r)/vmlinuz" ] &&
> opt_kernel="/lib/modules/$(uname -r)/vmlinuz"
> ++ [ -e "/lib/modules/$(@uname@ -r)/vmlinuz" ] &&
> opt_kernel="/lib/modules/$(@uname@ -r)/vmlinuz"
> + # Slackware:
> + [ -e "/boot/vmlinuz" ] &&
> opt_kernel="/boot/vmlinuz"
> + # Arch aarch64:
> +@@ -2091,24 +2091,24 @@ if [ "$opt_live" = 1 ]; then
> + # pine64
> + [ -e "/boot/pine64/Image" ] &&
> opt_kernel="/boot/pine64/Image"
> + # generic:
> +- [ -e "/boot/vmlinuz-$(uname -r)" ] &&
> opt_kernel="/boot/vmlinuz-$(uname -r)"
> +- [ -e "/boot/kernel-$( uname -r)" ] &&
> opt_kernel="/boot/kernel-$( uname -r)"
> +- [ -e "/boot/bzImage-$(uname -r)" ] &&
> opt_kernel="/boot/bzImage-$(uname -r)"
> ++ [ -e "/boot/vmlinuz-$(@uname@ -r)" ] &&
> opt_kernel="/boot/vmlinuz-$(@uname@ -r)"
> ++ [ -e "/boot/kernel-$( @uname@ -r)" ] &&
> opt_kernel="/boot/kernel-$( @uname@ -r)"
> ++ [ -e "/boot/bzImage-$(@uname@ -r)" ] &&
> opt_kernel="/boot/bzImage-$(@uname@ -r)"
> + # Gentoo:
> +- [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ++ [ -e "/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@
> -r)" ] && opt_kernel="/boot/kernel-genkernel-$(@uname@ -m)-$(@uname@
> -r)"
> + # NixOS:
> + [ -e "/run/booted-system/kernel" ] &&
> opt_kernel="/run/booted-system/kernel"
> + # Guix System:
> + [ -e "/run/booted-system/kernel/bzImage" ] &&
> opt_kernel="/run/booted-system/kernel/bzImage"
> + # systemd kernel-install:
> +- [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux"
> ++ [ -e "/etc/machine-id" ] && [ -e "/boot/$(@cat@
> /etc/machine-id)/$(@uname@ -r)/linux" ] && opt_kernel="/boot/$(@cat@
> /etc/machine-id)/$(@uname@ -r)/linux"
> + # Clear Linux:
> +- str_uname=$(uname -r)
> ++ str_uname=$(@uname@ -r)
> + clear_linux_kernel="/lib/kernel/org.clearlinux.${str_
> uname##*.}.${str_uname%.*}"
> + [ -e "$clear_linux_kernel" ] &&
> opt_kernel=$clear_linux_kernel
> + # Custom Arch seems to have the kernel path in its
> cmdline in the form "\directory\kernelimage",
> + # with actual \'s instead of /'s:
> +- custom_arch_kernel=$(echo "$kernel_cmdline" | grep -
> Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | tr "\\\\" "/" | tr -d
> '[:space:]')
> ++ custom_arch_kernel=$(echo "$kernel_cmdline" | @grep@
> -Eo "(^|\s)\\\\[\\\\a-zA-Z0-9_.-]+" | @tr@ "\\\\" "/" | @tr@ -d
> '[:space:]')
> + if [ -n "$custom_arch_kernel" ] && [ -e
> "$custom_arch_kernel" ]; then
> + opt_kernel="$custom_arch_kernel"
> + fi
> +@@ -2122,12 +2122,12 @@ if [ "$opt_live" = 1 ]; then
> + :
> + elif [ -e "$procfs/kallsyms" ] ; then
> + opt_map="$procfs/kallsyms"
> +- elif [ -e "/lib/modules/$(uname -r)/System.map" ] ; then
> +- opt_map="/lib/modules/$(uname -r)/System.map"
> +- elif [ -e "/boot/System.map-$(uname -r)" ] ; then
> +- opt_map="/boot/System.map-$(uname -r)"
> +- elif [ -e "/lib/kernel/System.map-$(uname -r)" ]; then
> +- opt_map="/lib/kernel/System.map-$(uname -r)"
> ++ elif [ -e "/lib/modules/$(@uname@ -r)/System.map" ] ; then
> ++ opt_map="/lib/modules/$(@uname@ -r)/System.map"
> ++ elif [ -e "/boot/System.map-$(@uname@ -r)" ] ; then
> ++ opt_map="/boot/System.map-$(@uname@ -r)"
> ++ elif [ -e "/lib/kernel/System.map-$(@uname@ -r)" ]; then
> ++ opt_map="/lib/kernel/System.map-$(@uname@ -r)"
> + fi
> +
> + # config
> +@@ -2135,18 +2135,18 @@ if [ "$opt_live" = 1 ]; then
> + # specified by user on cmdline, with --live, don't
> override
> + :
> + elif [ -e "$procfs/config.gz" ] ; then
> +- dumped_config="$(mktemp -t smc-config-XXXXXX)"
> +- gunzip -c "$procfs/config.gz" > "$dumped_config"
> ++ dumped_config="$(@mktemp@ -t smc-config-XXXXXX)"
> ++ @gunzip@ -c "$procfs/config.gz" > "$dumped_config"
> + # dumped_config will be deleted at the end of the
> script
> + opt_config="$dumped_config"
> +- elif [ -e "/lib/modules/$(uname -r)/config" ]; then
> +- opt_config="/lib/modules/$(uname -r)/config"
> +- elif [ -e "/boot/config-$(uname -r)" ]; then
> +- opt_config="/boot/config-$(uname -r)"
> +- elif [ -e "/etc/kernels/kernel-config-$(uname -m)-$(uname -
> r)" ]; then
> +- opt_config="/etc/kernels/kernel-config-$(uname -m)-
> $(uname -r)"
> +- elif [ -e "/lib/kernel/config-$(uname -r)" ]; then
> +- opt_config="/lib/kernel/config-$(uname -r)"
> ++ elif [ -e "/lib/modules/$(@uname@ -r)/config" ]; then
> ++ opt_config="/lib/modules/$(@uname@ -r)/config"
> ++ elif [ -e "/boot/config-$(@uname@ -r)" ]; then
> ++ opt_config="/boot/config-$(@uname@ -r)"
> ++ elif [ -e "/etc/kernels/kernel-config-$(@uname@ -m)-$(@uname@
> -r)" ]; then
> ++ opt_config="/etc/kernels/kernel-config-$(@uname@ -m)-
> $(@uname@ -r)"
> ++ elif [ -e "/lib/kernel/config-$(@uname@ -r)" ]; then
> ++ opt_config="/lib/kernel/config-$(@uname@ -r)"
> + fi
> + else
> + _info "Checking for vulnerabilities against specified kernel"
> +@@ -2161,7 +2161,7 @@ else
> + fi
> +
> + if [ "$os" = Linux ]; then
> +- if [ -n "$opt_config" ] && ! grep -q '^CONFIG_'
> "$opt_config"; then
> ++ if [ -n "$opt_config" ] && ! @grep@ -q '^CONFIG_'
> "$opt_config"; then
> + # given file is invalid!
> + _warn "The kernel config file seems invalid, was
> expecting a plain-text file, ignoring it!"
> + opt_config=''
> +@@ -2189,7 +2189,7 @@ if [ "$os" = Linux ]; then
> + fi
> +
> + if [ -e "$opt_kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}readelf" >/dev/null 2>&1;
> then
> ++ if ! command -v "@readelf@" >/dev/null 2>&1; then
> + _debug "readelf not found"
> + kernel_err="missing '${opt_arch_prefix}readelf' tool,
> please install it, usually it's in the 'binutils' package"
> + elif [ "$opt_sysfs_only" = 1 ] || [ "$opt_hw_only" = 1 ];
> then
> +@@ -2207,20 +2207,20 @@ else
> + # vanilla kernels have with ^Linux version
> + # also try harder with some kernels (such as Red Hat) that
> don't have ^Linux version before their version string
> + # and check for FreeBSD
> +- kernel_version=$("${opt_arch_prefix}strings" "$kernel"
> 2>/dev/null | grep -E \
> ++ kernel_version=$("@strings@" "$kernel" 2>/dev/null | @grep@ -
> E \
> + -e '^Linux version ' \
> + -e '^[[:alnum:]][^[:space:]]+ \([^[:space:]]+\) #[0-
> 9]+ .+ (19|20)[0-9][0-9]$' \
> +- -e '^FreeBSD [0-9]' | head -1)
> ++ -e '^FreeBSD [0-9]' | @head@ -1)
> + if [ -z "$kernel_version" ]; then
> + # try even harder with some kernels (such as ARM)
> that split the release (uname -r) and version (uname -v) in 2
> adjacent strings
> +- kernel_version=$("${opt_arch_prefix}strings"
> "$kernel" 2>/dev/null | grep -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$'
> | tr "\n" " ")
> ++ kernel_version=$("@strings@" "$kernel" 2>/dev/null |
> @grep@ -E -B1 '^#[0-9]+ .+ (19|20)[0-9][0-9]$' | @tr@ "\n" " ")
> + fi
> + if [ -n "$kernel_version" ]; then
> + # in live mode, check if the img we found is the
> correct one
> + if [ "$opt_live" = 1 ]; then
> + _verbose "Kernel image is
> \033[35m$kernel_version"
> +- if ! echo "$kernel_version" | grep -qF
> "$(uname -r)"; then
> +- _warn "Possible discrepancy between
> your running kernel '$(uname -r)' and the image '$kernel_version' we
> found ($opt_kernel), results might be incorrect"
> ++ if ! echo "$kernel_version" | @grep@ -qF
> "$(@uname@ -r)"; then
> ++ _warn "Possible discrepancy between
> your running kernel '$(@uname@ -r)' and the image '$kernel_version'
> we found ($opt_kernel), results might be incorrect"
> + fi
> + else
> + _info "Kernel image is
> \033[35m$kernel_version"
> +@@ -2248,11 +2248,11 @@ sys_interface_check()
> + if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs" = 0 ] && [ -r
> "$file" ]; then
> + :
> + else
> +- mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(basename "$file")_RET=1")
> ++ mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(@basename@ "$file")_RET=1")
> + return 1
> + fi
> +
> +- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")_RET"
> ++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")_RET"
> + # shellcheck disable=SC2086,SC1083
> + if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
> + _debug "sysfs: MOCKING enabled for $file func returns
> $(eval echo \$$_mockvarname)"
> +@@ -2261,17 +2261,17 @@ sys_interface_check()
> + fi
> +
> + [ -n "$regex" ] || regex='.*'
> +- _mockvarname="SMC_MOCK_SYSFS_$(basename "$file")"
> ++ _mockvarname="SMC_MOCK_SYSFS_$(@basename@ "$file")"
> + # shellcheck disable=SC2086,SC1083
> + if [ -n "$(eval echo \${$_mockvarname:-})" ]; then
> + fullmsg="$(eval echo \$$_mockvarname)"
> +- msg=$(echo "$fullmsg" | grep -Eo "$regex")
> ++ msg=$(echo "$fullmsg" | @grep@ -Eo "$regex")
> + _debug "sysfs: MOCKING enabled for $file, will return
> $fullmsg"
> + mocked=1
> + else
> +- fullmsg=$(cat "$file")
> +- msg=$(grep -Eo "$regex" "$file")
> +- mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(basename "$file")='$fullmsg'")
> ++ fullmsg=$(@cat@ "$file")
> ++ msg=$(@grep@ -Eo "$regex" "$file")
> ++ mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_SYSFS_$(@basename@ "$file")='$fullmsg'")
> + fi
> + if [ "$mode" = silent ]; then
> + return 0
> +@@ -2280,15 +2280,15 @@ sys_interface_check()
> + return 0
> + fi
> + _info_nol "* Mitigated according to the /sys interface: "
> +- if echo "$msg" | grep -qi '^not affected'; then
> ++ if echo "$msg" | @grep@ -qi '^not affected'; then
> + # Not affected
> + status=OK
> + pstatus green YES "$fullmsg"
> +- elif echo "$msg" | grep -qEi '^(kvm: )?mitigation'; then
> ++ elif echo "$msg" | @grep@ -qEi '^(kvm: )?mitigation'; then
> + # Mitigation: PTI
> + status=OK
> + pstatus green YES "$fullmsg"
> +- elif echo "$msg" | grep -qi '^vulnerable'; then
> ++ elif echo "$msg" | @grep@ -qi '^vulnerable'; then
> + # Vulnerable
> + status=VULN
> + pstatus yellow NO "$fullmsg"
> +@@ -2376,20 +2376,20 @@ write_msr_one_core()
> + # ret=4: msr doesn't exist, ret=127:
> msr.allow_writes=off
> + [ "$ret" = 127 ] && _write_denied=1
> + # or fallback to dd if it supports seek_bytes, we
> prefer it over perl because we can tell the difference between EPERM
> and EIO
> +- elif dd if=/dev/null of=/dev/null bs=8 count=1
> seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}"
> != 1 ]; then
> ++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1
> seek="$_msr_dec" oflag=seek_bytes 2>/dev/null && [ "${SMC_NO_DD:-}"
> != 1 ]; then
> + _debug "write_msr: using dd"
> +- dd if=/dev/zero of=/dev/cpu/"$_core"/msr bs=8
> count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
> ++ @dd@ if=/dev/zero of=/dev/cpu/"$_core"/msr
> bs=8 count=1 seek="$_msr_dec" oflag=seek_bytes 2>/dev/null; ret=$?
> + # if it failed, inspect stderrto look for
> EPERM
> + if [ "$ret" != 0 ]; then
> +- if dd if=/dev/zero
> of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec"
> oflag=seek_bytes 2>&1 | grep -qF 'Operation not permitted'; then
> ++ if @dd@ if=/dev/zero
> of=/dev/cpu/"$_core"/msr bs=8 count=1 seek="$_msr_dec"
> oflag=seek_bytes 2>&1 | @grep@ -qF 'Operation not permitted'; then
> + _write_denied=1
> + fi
> + fi
> + # or if we have perl, use it, any 5.x version will
> work
> +- elif command -v perl >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> ++ elif command -v @perl@ >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> + _debug "write_msr: using perl"
> + ret=1
> +- perl -e "open(M,'>','/dev/cpu/$_core/msr')
> and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -
> eq 8 ] && ret=0
> ++ @perl@ -e "open(M,'>','/dev/cpu/$_core/msr')
> and seek(M,$_msr_dec,0) and exit(syswrite(M,pack('H16',0)))"; [ $? -
> eq 8 ] && ret=0
> + else
> + _debug "write_msr: got no wrmsr, perl or
> recent enough dd!"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_ERR")
> +@@ -2411,13 +2411,13 @@ write_msr_one_core()
> + msr_locked_down=1
> + write_msr_msg="your kernel is
> configured to deny writes to MSRs from user space"
> + return $WRITE_MSR_RET_LOCKDOWN
> +- elif dmesg | grep -qF "msr: Direct access to
> MSR"; then
> ++ elif @dmesg@ | @grep@ -qF "msr: Direct access
> to MSR"; then
> + _debug "write_msr: locked down kernel
> detected (Red Hat / Fedora)"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
> + msr_locked_down=1
> + write_msr_msg="your kernel is locked
> down (Fedora/Red Hat), please reboot without secure boot and retry"
> + return $WRITE_MSR_RET_LOCKDOWN
> +- elif dmesg | grep -qF "raw MSR access is
> restricted"; then
> ++ elif @dmesg@ | @grep@ -qF "raw MSR access is
> restricted"; then
> + _debug "write_msr: locked down kernel
> detected (vanilla)"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_WRMSR_${_msr}_RET=$WRITE_MSR_RET_LOCKDOWN")
> + msr_locked_down=1
> +@@ -2516,8 +2516,8 @@ read_msr_one_core()
> + return $READ_MSR_RET_KO
> + fi
> + # MSR 0x10: 0x000003e1 0xb106dded
> +- _msr_h=$(echo "$_msr" | awk '{print $3}');
> +- _msr_l=$(echo "$_msr" | awk '{print $4}');
> ++ _msr_h=$(echo "$_msr" | @awk@ '{print $3}');
> ++ _msr_l=$(echo "$_msr" | @awk@ '{print $4}');
> + read_msr_value=$(( _msr_h << 32 | _msr_l ))
> + else
> + # for Linux
> +@@ -2528,15 +2528,15 @@ read_msr_one_core()
> + # if rdmsr is available, use it
> + elif command -v rdmsr >/dev/null 2>&1 && [
> "${SMC_NO_RDMSR:-}" != 1 ]; then
> + _debug "read_msr: using rdmsr on $_msr"
> +- read_msr_value=$(rdmsr -r $_msr_dec
> 2>/dev/null | od -t u8 -A n)
> ++ read_msr_value=$(rdmsr -r $_msr_dec
> 2>/dev/null | @od@ -t u8 -A n)
> + # or if we have perl, use it, any 5.x version will
> work
> +- elif command -v perl >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> ++ elif command -v @perl@ >/dev/null 2>&1 && [
> "${SMC_NO_PERL:-}" != 1 ]; then
> + _debug "read_msr: using perl on $_msr"
> +- read_msr_value=$(perl -e
> "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and
> read(M,\$_,8) and print" | od -t u8 -A n)
> ++ read_msr_value=$(@perl@ -e
> "open(M,'<','/dev/cpu/$_core/msr') and seek(M,$_msr_dec,0) and
> read(M,\$_,8) and print" | @od@ -t u8 -A n)
> + # fallback to dd if it supports skip_bytes
> +- elif dd if=/dev/null of=/dev/null bs=8 count=1
> skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
> ++ elif @dd@ if=/dev/null of=/dev/null bs=8 count=1
> skip="$_msr_dec" iflag=skip_bytes 2>/dev/null; then
> + _debug "read_msr: using dd on $_msr"
> +- read_msr_value=$(dd if=/dev/cpu/"$_core"/msr
> bs=8 count=1 skip="$_msr_dec" iflag=skip_bytes 2>/dev/null | od -t u8
> -A n)
> ++ read_msr_value=$(@dd@
> if=/dev/cpu/"$_core"/msr bs=8 count=1 skip="$_msr_dec"
> iflag=skip_bytes 2>/dev/null | @od@ -t u8 -A n)
> + else
> + _debug "read_msr: got no rdmsr, perl or
> recent enough dd!"
> + mockme=$(printf "%b\n%b" "$mockme"
> "SMC_MOCK_RDMSR_${_msr}_RET=$READ_MSR_RET_ERR")
> +@@ -2560,7 +2560,7 @@ check_cpu()
> + {
> + _info "\033[1;34mHardware check\033[0m"
> +
> +- if ! uname -m | grep -qwE 'x86_64|i[3-6]86|amd64'; then
> ++ if ! @uname@ -m | @grep@ -qwE 'x86_64|i[3-6]86|amd64'; then
> + return
> + fi
> +
> +@@ -3176,19 +3176,19 @@ check_redhat_canonical_spectre()
> + # if we were already called, don't do it again
> + [ -n "${redhat_canonical_spectre:-}" ] && return
> +
> +- if ! command -v "${opt_arch_prefix}strings" >/dev/null 2>&1;
> then
> ++ if ! command -v "@strings@" >/dev/null 2>&1; then
> + redhat_canonical_spectre=-1
> + elif [ -n "$kernel_err" ]; then
> + redhat_canonical_spectre=-2
> + else
> + # Red Hat / Ubuntu specific variant1 patch is
> difficult to detect,
> + # let's use the two same tricks than the official Red
> Hat detection script uses:
> +- if "${opt_arch_prefix}strings" "$kernel" | grep -qw
> noibrs && "${opt_arch_prefix}strings" "$kernel" | grep -qw noibpb;
> then
> ++ if "@strings@" "$kernel" | @grep@ -qw noibrs &&
> "@strings@" "$kernel" | @grep@ -qw noibpb; then
> + # 1) detect their specific variant2 patch. If
> it's present, it means
> + # that the variant1 patch is also present
> (both were merged at the same time)
> + _debug "found redhat/canonical version of the
> variant2 patch (implies variant1)"
> + redhat_canonical_spectre=1
> +- elif "${opt_arch_prefix}strings" "$kernel" | grep -q
> 'x86/pti:'; then
> ++ elif "@strings@" "$kernel" | @grep@ -q 'x86/pti:';
> then
> + # 2) detect their specific variant3 patch. If
> it's present, but the variant2
> + # is not, it means that only variant1 is
> present in addition to variant3
> + _debug "found redhat/canonical version of the
> variant3 patch (implies variant1 but not variant2)"
> +@@ -3213,13 +3213,13 @@ check_has_vmm()
> + # If we find no evidence that this is the case,
> assume we're not (to avoid scaring users),
> + # this can always be overridden with --vmm in any
> case.
> + has_vmm=0
> +- if command -v pgrep >/dev/null 2>&1; then
> ++ if command -v @pgrep@ >/dev/null 2>&1; then
> + # remove xenbus and xenwatch, also present
> inside domU
> + # remove libvirtd as it can also be used to
> manage containers and not VMs
> + # for each binary we want to grep, get the
> pids
> + for _binary in qemu kvm xenstored xenconsoled
> + do
> +- for _pid in $(pgrep -x $_binary)
> ++ for _pid in $(@pgrep@ -x $_binary)
> + do
> + # resolve the exe symlink, if
> it doesn't resolve with -m,
> + # which doesn't even need the
> dest to exist, it means the symlink
> +@@ -3235,7 +3235,7 @@ check_has_vmm()
> + else
> + # ignore SC2009 as `ps ax` is actually used
> as a fallback if `pgrep` isn't installed
> + # shellcheck disable=SC2009
> +- if command -v ps >/devnull && ps ax | grep -
> vw grep | grep -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e
> '/xenstored' -e '/xenconsoled'; then
> ++ if command -v ps >/devnull && ps ax | @grep@
> -vw grep | @grep@ -q -e '\<qemu' -e '/qemu' -e '<\kvm' -e '/kvm' -e
> '/xenstored' -e '/xenconsoled'; then
> + has_vmm=1
> + fi
> + fi
> +@@ -3267,7 +3267,7 @@ check_CVE_2017_5753()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5753_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5753_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -3319,20 +3319,20 @@ check_CVE_2017_5753_linux()
> + v1_mask_nospec=''
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> + else
> +- perl -ne
> '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> ++ @perl@ -ne
> '/\x0f\x83....\x48\x19\xd2\x48\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> + if [ $ret -gt 0 ]; then
> + pstatus green YES "$ret occurrence(s)
> found of x86 64 bits array_index_mask_nospec()"
> + v1_mask_nospec="x86 64 bits
> array_index_mask_nospec"
> + else
> +- perl -ne
> '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> ++ @perl@ -ne
> '/\x3b\x82..\x00\x00\x73.\x19\xd2\x21\xd0/ and $found++; END {
> exit($found) }' "$kernel"; ret=$?
> + if [ $ret -gt 0 ]; then
> + pstatus green YES "$ret
> occurrence(s) found of x86 32 bits array_index_mask_nospec()"
> + v1_mask_nospec="x86 32 bits
> array_index_mask_nospec"
> + else
> +-
> ret=$("${opt_arch_prefix}objdum
> p" $objdump_options "$kernel" | grep -w -e f3af8014 -e e320f014 -B2 |
> grep -B1 -w sbc | grep -w -c cmp)
> ++ ret=$("@objdump@"
> $objdump_options "$kernel" | @grep@ -w -e f3af8014 -e e320f014 -B2 |
> @grep@ -B1 -w sbc | @grep@ -w -c cmp)
> + if [ "$ret" -gt 0 ]; then
> + pstatus green YES
> "$ret occurrence(s) found of arm 32 bits array_index_mask_nospec()"
> + v1_mask_nospec="arm
> 32 bits array_index_mask_nospec"
> +@@ -3376,12 +3376,12 @@ check_CVE_2017_5753_linux()
> + pstatus yellow NO
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> +- elif ! command -v "${opt_arch_prefix}objdump"
> >/dev/null 2>&1; then
> ++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}objdump' tool, please install it, usually it's in
> the binutils package"
> + else
> +- "${opt_arch_prefix}objdump" $objdump_options
> "$kernel" | perl -ne 'push @r, $_; /\s(hint|csdb)\s/ &&
> $r[0]=~/\ssub\s+(x\d+)/ && $r[1]=~/\sbic\s+$1,\s+$1,/ &&
> $r[2]=~/\sand\s/ && exit(9); shift @r if @r>3'; ret=$?
> ++ "@objdump@" $objdump_options "$kernel" |
> @perl@ -ne 'push @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\ssub\s+(x\d+)/
> && $r[1]=~/\sbic\s+$1,\s+$1,/ && $r[2]=~/\sand\s/ && exit(9); shift
> @r if @r>3'; ret=$?
> + if [ "$ret" -eq 9 ]; then
> + pstatus green YES "mask_nospec64
> macro is present and used"
> + v1_mask_nospec="arm64 mask_nospec64"
> +@@ -3403,12 +3403,12 @@ check_CVE_2017_5753_linux()
> + pstatus yellow NO
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check
> ($kernel_err)"
> +- elif ! command -v perl >/dev/null 2>&1; then
> ++ elif ! command -v @perl@ >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'perl'
> binary, please install it"
> +- elif ! command -v "${opt_arch_prefix}objdump"
> >/dev/null 2>&1; then
> ++ elif ! command -v "@objdump@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}objdump' tool, please install it, usually it's in
> the binutils package"
> + else
> +- "${opt_arch_prefix}objdump" -d "$kernel" |
> perl -ne 'push @r, $_; /\s(hint|csdb)\s/ &&
> $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ &&
> $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9);
> shift @r if @r>3'; ret=$?
> ++ "@objdump@" -d "$kernel" | @perl@ -ne 'push
> @r, $_; /\s(hint|csdb)\s/ && $r[0]=~/\smov\s+(w\d+),\s+(w\d+)/ &&
> $r[1]=~/\scmp\s+(x\d+),\s+(x\d+)/ && $r[2]=~/\sngc\s+$2,/ && exit(9);
> shift @r if @r>3'; ret=$?
> + if [ "$ret" -eq 9 ]; then
> + pstatus green YES "array_index_nospec
> macro is present and used"
> + v1_mask_nospec="arm64
> array_index_nospec"
> +@@ -3424,7 +3424,7 @@ check_CVE_2017_5753_linux()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't
> check ($kernel_err)"
> + else
> +- if ! command -v
> "${opt_arch_prefix}objdump" >/dev/null 2>&1; then
> ++ if ! command -v "@objdump@"
> >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN
> "missing '${opt_arch_prefix}objdump' tool, please install it, usually
> it's in the binutils package"
> + else
> + # here we disassemble the
> kernel and count the number of occurrences of the LFENCE opcode
> +@@ -3434,7 +3434,7 @@ check_CVE_2017_5753_linux()
> + # so let's push the threshold
> to 70.
> + # v0.33+: now only count
> lfence opcodes after a jump, way less error-prone
> + # non patched kernel have
> between 0 and 20 matches, patched ones have at least 40-45
> +-
> nb_lfence=$("${opt_arch_prefix}
> objdump" $objdump_options "$kernel" 2>/dev/null | grep -w -B1 lfence
> | grep -Ewc 'jmp|jne|je')
> ++ nb_lfence=$("@objdump@"
> $objdump_options "$kernel" 2>/dev/null | @grep@ -w -B1 lfence |
> @grep@ -Ewc 'jmp|jne|je')
> + if [ "$nb_lfence" -lt 30 ];
> then
> + pstatus yellow NO
> "only $nb_lfence jump-then-lfence instructions found, should be >= 30
> (heuristic)"
> + else
> +@@ -3505,7 +3505,7 @@ check_CVE_2017_5715()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5715_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5715_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -3547,13 +3547,13 @@ check_CVE_2017_5715_linux()
> + #
> /proc/sys/kernel/ibrs_enabled: OpenSUSE tumbleweed
> + specex_knob_dir=$dir
> + ibrs_supported="$dir/ibrs_ena
> bled exists"
> +- ibrs_enabled=$(cat
> "$dir/ibrs_enabled" 2>/dev/null)
> ++ ibrs_enabled=$(@cat@
> "$dir/ibrs_enabled" 2>/dev/null)
> + _debug "ibrs: found
> $dir/ibrs_enabled=$ibrs_enabled"
> + # if ibrs_enabled is there,
> ibpb_enabled will be in the same dir
> + if [ -e "$dir/ibpb_enabled"
> ]; then
> + # if the file is
> there, we have IBPB compiled-in (see note above for IBRS)
> + ibpb_supported="$dir/
> ibpb_enabled exists"
> +- ibpb_enabled=$(cat
> "$dir/ibpb_enabled" 2>/dev/null)
> ++ ibpb_enabled=$(@cat@
> "$dir/ibpb_enabled" 2>/dev/null)
> + _debug "ibpb: found
> $dir/ibpb_enabled=$ibpb_enabled"
> + else
> + _debug "ibpb:
> $dir/ibpb_enabled file doesn't exist"
> +@@ -3568,7 +3568,7 @@ check_CVE_2017_5715_linux()
> + # which in that case means ibrs is supported
> *and* enabled for kernel & user
> + # as per the ibrs patch series v3
> + if [ -z "$ibrs_supported" ]; then
> +- if grep ^flags "$procfs/cpuinfo" |
> grep -qw spec_ctrl_ibrs; then
> ++ if @grep@ ^flags "$procfs/cpuinfo" |
> @grep@ -qw spec_ctrl_ibrs; then
> + _debug "ibrs: found
> spec_ctrl_ibrs flag in $procfs/cpuinfo"
> + ibrs_supported="spec_ctrl_ibr
> s flag in $procfs/cpuinfo"
> + # enabled=2 -> kernel & user
> +@@ -3578,13 +3578,13 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -n "$fullmsg" ]; then
> + # when IBPB is enabled on 4.15+, we
> can see it in sysfs
> +- if echo "$fullmsg" | grep -q 'IBPB';
> then
> ++ if echo "$fullmsg" | @grep@ -q
> 'IBPB'; then
> + _debug "ibpb: found enabled
> in sysfs"
> + [ -z "$ibpb_supported" ] &&
> ibpb_supported='IBPB found enabled in sysfs'
> + [ -z "$ibpb_enabled" ] &&
> ibpb_enabled=1
> + fi
> + # when IBRS_FW is enabled on 4.15+,
> we can see it in sysfs
> +- if echo "$fullmsg" | grep -q ',
> IBRS_FW'; then
> ++ if echo "$fullmsg" | @grep@ -q ',
> IBRS_FW'; then
> + _debug "ibrs: found IBRS_FW
> in sysfs"
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found IBRS_FW in sysfs'
> + ibrs_fw_enabled=1
> +@@ -3592,13 +3592,13 @@ check_CVE_2017_5715_linux()
> + # when IBRS is enabled on 4.15+, we
> can see it in sysfs
> + # on a more recent kernel, classic
> "IBRS" is not even longer an option, because of the performance
> impact.
> + # only "Enhanced IBRS" is available
> (on CPUs with the IBRS_ALL flag)
> +- if echo "$fullmsg" | grep -q -e
> '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
> ++ if echo "$fullmsg" | @grep@ -q -e
> '\<IBRS\>' -e 'Indirect Branch Restricted Speculation'; then
> + _debug "ibrs: found IBRS in
> sysfs"
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found IBRS in sysfs'
> + [ -z "$ibrs_enabled" ] &&
> ibrs_enabled=3
> + fi
> + # checking for 'Enhanced IBRS' in
> sysfs, enabled on CPUs with IBRS_ALL
> +- if echo "$fullmsg" | grep -q -e
> 'Enhanced IBRS'; then
> ++ if echo "$fullmsg" | @grep@ -q -e
> 'Enhanced IBRS'; then
> + [ -z "$ibrs_supported" ] &&
> ibrs_supported='found Enhanced IBRS in sysfs'
> + # 4 isn't actually a valid
> value of the now extinct "ibrs_enabled" flag file,
> + # that only went from 0 to 3,
> so we use 4 as "enhanced ibrs is enabled"
> +@@ -3617,11 +3617,11 @@ check_CVE_2017_5715_linux()
> + fi
> + fi
> + if [ -z "$ibrs_supported" ] && [ -n "$kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + :
> + else
> + ibrs_can_tell=1
> +-
> ibrs_supported=$("${opt_arch_prefix}str
> ings" "$kernel" | grep -Fw -e ', IBRS_FW' | head -1)
> ++ ibrs_supported=$("@strings@"
> "$kernel" | @grep@ -Fw -e ', IBRS_FW' | @head@ -1)
> + if [ -n "$ibrs_supported" ]; then
> + _debug "ibrs: found ibrs
> evidence in kernel image ($ibrs_supported)"
> + ibrs_supported="found
> '$ibrs_supported' in kernel image"
> +@@ -3630,7 +3630,7 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -z "$ibrs_supported" ] && [ -n "$opt_map" ];
> then
> + ibrs_can_tell=1
> +- if grep -q spec_ctrl "$opt_map"; then
> ++ if @grep@ -q spec_ctrl "$opt_map"; then
> + ibrs_supported="found spec_ctrl in
> symbols file"
> + _debug "ibrs: found '*spec_ctrl*'
> symbol in $opt_map"
> + fi
> +@@ -3638,11 +3638,11 @@ check_CVE_2017_5715_linux()
> + # recent (4.15) vanilla kernels have IBPB but not
> IBRS, and without the debugfs tunables of Red Hat
> + # we can detect it directly in the image
> + if [ -z "$ibpb_supported" ] && [ -n "$kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + :
> + else
> + ibpb_can_tell=1
> +-
> ibpb_supported=$("${opt_arch_prefix}str
> ings" "$kernel" | grep -Fw -e 'ibpb' -e ', IBPB' | head -1)
> ++ ibpb_supported=$("@strings@"
> "$kernel" | @grep@ -Fw -e 'ibpb' -e ', IBPB' | @head@ -1)
> + if [ -n "$ibpb_supported" ]; then
> + _debug "ibpb: found ibpb
> evidence in kernel image ($ibpb_supported)"
> + ibpb_supported="found
> '$ibpb_supported' in kernel image"
> +@@ -3691,9 +3691,9 @@ check_CVE_2017_5715_linux()
> + 2) if [
> "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel, user
> space, and firmware code" ; else pstatus green YES "for both kernel
> and user space"; fi;;
> + 3) if [
> "$ibrs_fw_enabled" = 1 ]; then pstatus green YES "for kernel and
> firmware code"; else pstatus green YES; fi;;
> + 4) pstatus green YES
> "Enhanced flavor, performance impact will be greatly reduced";;
> +- *) if [ "$cpuid_ibrs" !=
> 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [
> "$cpuid_spec_ctrl" != -1 ];
> +- then pstatus
> yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
> +- else
> ++ *) if [ "$cpuid_ibrs" !=
> 'SPEC_CTRL' ] && [ "$cpuid_ibrs" != 'IBRS_SUPPORT' ] && [
> "$cpuid_spec_ctrl" != -1 ];
> ++ then pstatus
> yellow NO; _debug "ibrs: known cpu not supporting SPEC-CTRL or IBRS";
> ++ else
> + pstatus
> yellow UNKNOWN; fi;;
> + esac
> + fi
> +@@ -3744,7 +3744,7 @@ check_CVE_2017_5715_linux()
> + bp_harden=''
> + if [ -r "$opt_config" ]; then
> + bp_harden_can_tell=1
> +- bp_harden=$(grep -w
> 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
> ++ bp_harden=$(@grep@ -w
> 'CONFIG_HARDEN_BRANCH_PREDICTOR=y' "$opt_config")
> + if [ -n "$bp_harden" ]; then
> + pstatus green YES
> + _debug "bp_harden: found '$bp_harden'
> in $opt_config"
> +@@ -3752,7 +3752,7 @@ check_CVE_2017_5715_linux()
> + fi
> + if [ -z "$bp_harden" ] && [ -n "$opt_map" ]; then
> + bp_harden_can_tell=1
> +- bp_harden=$(grep -w bp_hardening_data
> "$opt_map")
> ++ bp_harden=$(@grep@ -w bp_hardening_data
> "$opt_map")
> + if [ -n "$bp_harden" ]; then
> + pstatus green YES
> + _debug "bp_harden: found '$bp_harden'
> in $opt_map"
> +@@ -3770,11 +3770,11 @@ check_CVE_2017_5715_linux()
> + # We check the RETPOLINE kernel options
> + retpoline=0
> + if [ -r "$opt_config" ]; then
> +- if grep -q '^CONFIG_RETPOLINE=y'
> "$opt_config"; then
> ++ if @grep@ -q '^CONFIG_RETPOLINE=y'
> "$opt_config"; then
> + pstatus green YES
> + retpoline=1
> + # shellcheck disable=SC2046
> +- _debug 'retpoline: found '$(grep
> '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
> ++ _debug 'retpoline: found '$(@grep@
> '^CONFIG_RETPOLINE' "$opt_config")" in $opt_config"
> + else
> + pstatus yellow NO
> + fi
> +@@ -3795,8 +3795,8 @@ check_CVE_2017_5715_linux()
> + # since 5.15.28, this is now "Retpolines" as
> the implementation was switched to a generic one,
> + # so we look for both "retpoline" and
> "retpolines"
> + if [ "$opt_live" = 1 ] && [ -n "$fullmsg" ];
> then
> +- if echo "$fullmsg" | grep -qwi -e
> retpoline -e retpolines; then
> +- if echo "$fullmsg" | grep -
> qwi minimal; then
> ++ if echo "$fullmsg" | @grep@ -qwi -e
> retpoline -e retpolines; then
> ++ if echo "$fullmsg" | @grep@ -
> qwi minimal; then
> + retpoline_compiler=0
> + retpoline_compiler_re
> ason="kernel reports minimal retpoline compilation"
> + else
> +@@ -3806,19 +3806,19 @@ check_CVE_2017_5715_linux()
> + fi
> + elif [ -n "$opt_map" ]; then
> + # look for the symbol
> +- if grep -qw noretpoline_setup
> "$opt_map"; then
> ++ if @grep@ -qw noretpoline_setup
> "$opt_map"; then
> + retpoline_compiler=1
> + retpoline_compiler_reason="no
> retpoline_setup symbol found in System.map"
> + fi
> + elif [ -n "$kernel" ]; then
> + # look for the symbol
> +- if command -v "${opt_arch_prefix}nm"
> >/dev/null 2>&1; then
> ++ if command -v "@nm@" >/dev/null 2>&1;
> then
> + # the proper way: use nm and
> look for the symbol
> +- if "${opt_arch_prefix}nm"
> "$kernel" 2>/dev/null | grep -qw 'noretpoline_setup'; then
> ++ if "@nm@" "$kernel"
> 2>/dev/null | @grep@ -qw 'noretpoline_setup'; then
> + retpoline_compiler=1
> + retpoline_compiler_re
> ason="noretpoline_setup found in kernel symbols"
> + fi
> +- elif grep -q noretpoline_setup
> "$kernel"; then
> ++ elif @grep@ -q noretpoline_setup
> "$kernel"; then
> + # if we don't have nm,
> nevermind, the symbol name is long enough to not have
> + # any false positive using
> good old grep directly on the binary
> + retpoline_compiler=1
> +@@ -3847,7 +3847,7 @@ check_CVE_2017_5715_linux()
> + retp_enabled=-1
> + if [ "$opt_live" = 1 ]; then
> + if [ -e "$specex_knob_dir/retp_enabled" ];
> then
> +- retp_enabled=$(cat
> "$specex_knob_dir/retp_enabled" 2>/dev/null)
> ++ retp_enabled=$(@cat@
> "$specex_knob_dir/retp_enabled" 2>/dev/null)
> + _debug "retpoline: found
> $specex_knob_dir/retp_enabled=$retp_enabled"
> + _info_nol " * Retpoline is
> enabled: "
> + if [ "$retp_enabled" = 1 ]; then
> +@@ -3877,7 +3877,7 @@ check_CVE_2017_5715_linux()
> + rsb_filling=0
> + if [ "$opt_live" = 1 ] && [ "$opt_no_sysfs"
> != 1 ]; then
> + # if we're live and we aren't denied
> looking into /sys, let's do it
> +- if echo "$msg" | grep -qw RSB; then
> ++ if echo "$msg" | @grep@ -qw RSB; then
> + rsb_filling=1
> + pstatus green YES
> + fi
> +@@ -3886,7 +3886,7 @@ check_CVE_2017_5715_linux()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN
> "couldn't check ($kernel_err)"
> + else
> +- if grep -qw -e 'Filling RSB
> on context switch' "$kernel"; then
> ++ if @grep@ -qw -e 'Filling RSB
> on context switch' "$kernel"; then
> + rsb_filling=1
> + pstatus green YES
> + else
> +@@ -4048,7 +4048,7 @@ check_CVE_2017_5715_bsd()
> + {
> + _info "* Mitigation 1"
> + _info_nol " * Kernel supports IBRS: "
> +- ibrs_disabled=$(sysctl -n hw.ibrs_disable 2>/dev/null)
> ++ ibrs_disabled=$(@sysctl@ -n hw.ibrs_disable 2>/dev/null)
> + if [ -z "$ibrs_disabled" ]; then
> + pstatus yellow NO
> + else
> +@@ -4056,7 +4056,7 @@ check_CVE_2017_5715_bsd()
> + fi
> +
> + _info_nol " * IBRS enabled and active: "
> +- ibrs_active=$(sysctl -n hw.ibrs_active 2>/dev/null)
> ++ ibrs_active=$(@sysctl@ -n hw.ibrs_active 2>/dev/null)
> + if [ "$ibrs_active" = 1 ]; then
> + pstatus green YES
> + else
> +@@ -4069,10 +4069,10 @@ check_CVE_2017_5715_bsd()
> + if [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "couldn't check ($kernel_err)"
> + else
> +- if ! command -v "${opt_arch_prefix}readelf"
> >/dev/null 2>&1; then
> ++ if ! command -v "@readelf@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}readelf' tool, please install it, usually it's in
> the binutils package"
> + else
> +- nb_thunks=$("${opt_arch_prefix}readelf" -s
> "$kernel" | grep -c -e __llvm_retpoline_ -e
> __llvm_external_retpoline_ -e __x86_indirect_thunk_)
> ++ nb_thunks=$("@readelf@" -s "$kernel" | @grep@
> -c -e __llvm_retpoline_ -e __llvm_external_retpoline_ -e
> __x86_indirect_thunk_)
> + if [ "$nb_thunks" -gt 0 ]; then
> + retpoline=1
> + pstatus green YES "found $nb_thunks
> thunk(s)"
> +@@ -4113,7 +4113,7 @@ check_CVE_2017_5715_bsd()
> + pti_performance_check()
> + {
> + _info_nol " * Reduced performance impact of PTI: "
> +- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo"
> | grep -qw pcid; then
> ++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw pcid; then
> + cpu_pcid=1
> + else
> + read_cpuid 0x1 0x0 $ECX 17 1 1; ret=$?
> +@@ -4122,7 +4122,7 @@ pti_performance_check()
> + fi
> + fi
> +
> +- if [ -e "$procfs/cpuinfo" ] && grep ^flags "$procfs/cpuinfo"
> | grep -qw invpcid; then
> ++ if [ -e "$procfs/cpuinfo" ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw invpcid; then
> + cpu_invpcid=1
> + else
> + read_cpuid 0x7 0x0 $EBX 10 1 1; ret=$?
> +@@ -4147,7 +4147,7 @@ check_CVE_2017_5754()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2017_5754_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2017_5754_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4169,7 +4169,7 @@ check_CVE_2017_5754_linux()
> + kpti_can_tell=0
> + if [ -n "$opt_config" ]; then
> + kpti_can_tell=1
> +- kpti_support=$(grep -w -e
> CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e
> CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
> ++ kpti_support=$(@grep@ -w -e
> CONFIG_PAGE_TABLE_ISOLATION=y -e CONFIG_KAISER=y -e
> CONFIG_UNMAP_KERNEL_AT_EL0=y "$opt_config")
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found option
> '$kpti_support' in $opt_config"
> + fi
> +@@ -4179,7 +4179,7 @@ check_CVE_2017_5754_linux()
> + # so we try to find an exported symbol that
> is part of the PTI patch in System.map
> + # parse_kpti: arm
> + kpti_can_tell=1
> +- kpti_support=$(grep -w -e kpti_force_enabled
> -e parse_kpti "$opt_map")
> ++ kpti_support=$(@grep@ -w -e
> kpti_force_enabled -e parse_kpti "$opt_map")
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found
> '$kpti_support' in $opt_map"
> + fi
> +@@ -4189,10 +4189,10 @@ check_CVE_2017_5754_linux()
> + # nopti option that is part of the patch
> (kernel command line option)
> + # 'kpti=': arm
> + kpti_can_tell=1
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + pstatus yellow UNKNOWN "missing
> '${opt_arch_prefix}strings' tool, please install it, usually it's in
> the binutils package"
> + else
> +-
> kpti_support=$("${opt_arch_prefix}strin
> gs" "$kernel" | grep -w -e nopti -e kpti=)
> ++ kpti_support=$("@strings@" "$kernel"
> | @grep@ -w -e nopti -e kpti=)
> + if [ -n "$kpti_support" ]; then
> + _debug "kpti_support: found
> '$kpti_support' in $kernel"
> + fi
> +@@ -4219,20 +4219,20 @@ check_CVE_2017_5754_linux()
> + dmesg_grep="$dmesg_grep|x86/pti: Unmapping
> kernel while in userspace"
> + # aarch64
> + dmesg_grep="$dmesg_grep|CPU features:
> detected( feature)?: Kernel page table isolation \(KPTI\)"
> +- if grep ^flags "$procfs/cpuinfo" | grep -qw
> pti; then
> ++ if @grep@ ^flags "$procfs/cpuinfo" | @grep@ -
> qw pti; then
> + # vanilla PTI patch sets the 'pti'
> flag in cpuinfo
> + _debug "kpti_enabled: found 'pti'
> flag in $procfs/cpuinfo"
> + kpti_enabled=1
> +- elif grep ^flags "$procfs/cpuinfo" | grep -qw
> kaiser; then
> ++ elif @grep@ ^flags "$procfs/cpuinfo" | @grep@
> -qw kaiser; then
> + # kernel line 4.9 sets the 'kaiser'
> flag in cpuinfo
> + _debug "kpti_enabled: found 'kaiser'
> flag in $procfs/cpuinfo"
> + kpti_enabled=1
> + elif [ -e /sys/kernel/debug/x86/pti_enabled
> ]; then
> + # Red Hat Backport creates a
> dedicated file, see https://access.redhat.com/articles/3311301
> +- kpti_enabled=$(cat
> /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
> ++ kpti_enabled=$(@cat@
> /sys/kernel/debug/x86/pti_enabled 2>/dev/null)
> + _debug "kpti_enabled: file
> /sys/kernel/debug/x86/pti_enabled exists and says: $kpti_enabled"
> + elif is_xen_dom0; then
> +- pti_xen_pv_domU=$(xl dmesg | grep
> 'XPTI' | grep 'DomU enabled' | head -1)
> ++ pti_xen_pv_domU=$(xl @dmesg@ | @grep@
> 'XPTI' | @grep@ 'DomU enabled' | @head@ -1)
> +
> + [ -n "$pti_xen_pv_domU" ] &&
> kpti_enabled=1
> + fi
> +@@ -4307,7 +4307,7 @@ check_CVE_2017_5754_linux()
> + if [ -n "$kpti_support" ]; then
> + if [ -e
> "/sys/kernel/debug/x86/pti_enabled" ]; then
> + explain "Your kernel
> supports PTI but it's disabled, you can enable it with \`echo 1 >
> /sys/kernel/debug/x86/pti_enabled\`"
> +- elif echo "$kernel_cmdline" |
> grep -q -w -e nopti -e pti=off; then
> ++ elif echo "$kernel_cmdline" |
> @grep@ -q -w -e nopti -e pti=off; then
> + explain "Your kernel
> supports PTI but it has been disabled on command-line, remove the
> nopti or pti=off option from your bootloader configuration"
> + else
> + explain "Your kernel
> supports PTI but it has been disabled, check \`dmesg\` right after
> boot to find clues why the system disabled it"
> +@@ -4358,7 +4358,7 @@ check_CVE_2017_5754_linux()
> + check_CVE_2017_5754_bsd()
> + {
> + _info_nol "* Kernel supports Page Table Isolation (PTI): "
> +- kpti_enabled=$(sysctl -n vm.pmap.pti 2>/dev/null)
> ++ kpti_enabled=$(@sysctl@ -n vm.pmap.pti 2>/dev/null)
> + if [ -z "$kpti_enabled" ]; then
> + pstatus yellow NO
> + else
> +@@ -4429,7 +4429,7 @@ check_CVE_2018_3639()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3639_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3639_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4448,33 +4448,33 @@ check_CVE_2018_3639_linux()
> + if [ "$opt_sysfs_only" != 1 ]; then
> + _info_nol "* Kernel supports disabling speculative
> store bypass (SSB): "
> + if [ "$opt_live" = 1 ]; then
> +- if grep -Eq 'Speculation.?Store.?Bypass:'
> "$procfs/self/status" 2>/dev/null; then
> ++ if @grep@ -Eq 'Speculation.?Store.?Bypass:'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssb="found in
> $procfs/self/status"
> + _debug "found
> Speculation.Store.Bypass: in $procfs/self/status"
> + fi
> + fi
> + # arm64 kernels can have cpu_show_spec_store_bypass
> with ARM64_SSBD, so exclude them
> +- if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && ! grep
> -q 'arm64_sys_' "$kernel"; then
> +- kernel_ssb=$("${opt_arch_prefix}strings"
> "$kernel" | grep spec_store_bypass | head -n1);
> ++ if [ -z "$kernel_ssb" ] && [ -n "$kernel" ] && !
> @grep@ -q 'arm64_sys_' "$kernel"; then
> ++ kernel_ssb=$("@strings@" "$kernel" | @grep@
> spec_store_bypass | @head@ -n1);
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in kernel"
> + fi
> + # arm64 kernels can have cpu_show_spec_store_bypass
> with ARM64_SSBD, so exclude them
> +- if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && !
> grep -q 'arm64_sys_' "$opt_map"; then
> +- kernel_ssb=$(grep spec_store_bypass
> "$opt_map" | awk '{print $3}' | head -n1)
> ++ if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ] && !
> @grep@ -q 'arm64_sys_' "$opt_map"; then
> ++ kernel_ssb=$(@grep@ spec_store_bypass
> "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in System.map"
> + fi
> + # arm64 only:
> + if [ -z "$kernel_ssb" ] && [ -n "$opt_map" ]; then
> +- kernel_ssb=$(grep -w cpu_enable_ssbs
> "$opt_map" | awk '{print $3}' | head -n1)
> ++ kernel_ssb=$(@grep@ -w cpu_enable_ssbs
> "$opt_map" | @awk@ '{print $3}' | @head@ -n1)
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> $kernel_ssb in System.map"
> + fi
> + if [ -z "$kernel_ssb" ] && [ -n "$opt_config" ]; then
> +- kernel_ssb=$(grep -w 'CONFIG_ARM64_SSBD=y'
> "$opt_config")
> ++ kernel_ssb=$(@grep@ -w 'CONFIG_ARM64_SSBD=y'
> "$opt_config")
> + [ -n "$kernel_ssb" ] &&
> kernel_ssb="CONFIG_ARM64_SSBD enabled in kconfig"
> + fi
> + if [ -z "$kernel_ssb" ] && [ -n "$kernel" ]; then
> + # this string only appears in kernel if
> CONFIG_ARM64_SSBD is set
> +- kernel_ssb=$(grep -w "Speculative Store
> Bypassing Safe (SSBS)" "$kernel")
> ++ kernel_ssb=$(@grep@ -w "Speculative Store
> Bypassing Safe (SSBS)" "$kernel")
> + [ -n "$kernel_ssb" ] && kernel_ssb="found
> 'Speculative Store Bypassing Safe (SSBS)' in kernel"
> + fi
> + # /arm64 only
> +@@ -4489,31 +4489,31 @@ check_CVE_2018_3639_linux()
> + if [ "$opt_live" = 1 ]; then
> + #
> https://elixir.bootlin.com/linux/v5.0/source/fs/proc/array.c#L340
> + _info_nol "* SSB mitigation is enabled and
> active: "
> +- if grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status"
> 2>/dev/null; then
> ++ if @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+thread' "$procfs/self/status"
> 2>/dev/null; then
> + kernel_ssbd_enabled=1
> + pstatus green YES "per-thread through
> prctl"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+globally mitigated'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=2
> + pstatus green YES "global"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=0
> + pstatus yellow NO
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+not vulnerable'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=-2
> + pstatus blue NO "not vulnerable"
> +- elif grep -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+unknown'
> "$procfs/self/status" 2>/dev/null; then
> ++ elif @grep@ -Eq
> 'Speculation.?Store.?Bypass:[[:space:]]+unknown'
> "$procfs/self/status" 2>/dev/null; then
> + kernel_ssbd_enabled=0
> + pstatus blue NO
> + else
> +- pstatus blue UNKNOWN "unknown value:
> $(grep -E 'Speculation.?Store.?Bypass:' "$procfs/self/status"
> 2>/dev/null | cut -d: -f2-)"
> ++ pstatus blue UNKNOWN "unknown value:
> $(@grep@ -E 'Speculation.?Store.?Bypass:' "$procfs/self/status"
> 2>/dev/null | @cut@ -d: -f2-)"
> + fi
> +
> + if [ "$kernel_ssbd_enabled" = 1 ]; then
> + _info_nol "* SSB mitigation currently
> active for selected processes: "
> + # silence grep's stderr here to avoid
> ENOENT errors from processes that have exited since the shell's
> expansion of the *
> +- mitigated_processes=$(find /proc -
> mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
> +- | xargs -r0 grep -El
> 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated'
> 2>/dev/null \
> +- | sed s/status/exe/ | xargs -
> r -n1 readlink -f 2>/dev/null | xargs -r -n1 basename | sort -u | tr
> "\n" " " | sed 's/ $//')
> ++ mitigated_processes=$(@find@ /proc -
> mindepth 2 -maxdepth 2 -type f -name status -print0 2>/dev/null \
> ++ | @xargs@ -r0 @grep@ -El
> 'Speculation.?Store.?Bypass:[[:space:]]+thread (force )?mitigated'
> 2>/dev/null \
> ++ | @sed@ s/status/exe/ |
> @xargs@ -r -n1 readlink -f 2>/dev/null | @xargs@ -r -n1 @basename@ |
> @sort@ -u | @tr@ "\n" " " | @sed@ 's/ $//')
> + if [ -n "$mitigated_processes" ];
> then
> + pstatus green YES
> "$mitigated_processes"
> + else
> +@@ -4565,7 +4565,7 @@ check_CVE_2018_3639_linux()
> + check_CVE_2018_3639_bsd()
> + {
> + _info_nol "* Kernel supports speculation store bypass: "
> +- if sysctl hw.spec_store_bypass_disable >/dev/null 2>&1; then
> ++ if @sysctl@ hw.spec_store_bypass_disable >/dev/null 2>&1;
> then
> + kernel_ssb=1
> + pstatus green YES
> + else
> +@@ -4574,7 +4574,7 @@ check_CVE_2018_3639_bsd()
> + fi
> +
> + _info_nol "* Speculation store bypass is administratively
> enabled: "
> +- ssb_enabled=$(sysctl -n hw.spec_store_bypass_disable
> 2>/dev/null)
> ++ ssb_enabled=$(@sysctl@ -n hw.spec_store_bypass_disable
> 2>/dev/null)
> + _debug "hw.spec_store_bypass_disable=$ssb_enabled"
> + case "$ssb_enabled" in
> + 0) pstatus yellow NO "disabled";;
> +@@ -4584,7 +4584,7 @@ check_CVE_2018_3639_bsd()
> + esac
> +
> + _info_nol "* Speculation store bypass is currently active: "
> +- ssb_active=$(sysctl -n hw.spec_store_bypass_disable_active
> 2>/dev/null)
> ++ ssb_active=$(@sysctl@ -n hw.spec_store_bypass_disable_active
> 2>/dev/null)
> + _debug "hw.spec_store_bypass_disable_active=$ssb_active"
> + case "$ssb_active" in
> + 1) pstatus green YES;;
> +@@ -4656,7 +4656,7 @@ check_CVE_2018_3620()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3620_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3620_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4674,14 +4674,14 @@ check_CVE_2018_3620_linux()
> + fi
> + if [ "$opt_sysfs_only" != 1 ]; then
> + _info_nol "* Kernel supports PTE inversion: "
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1; then
> + pstatus yellow UNKNOWN "missing 'strings'
> tool, please install it"
> + pteinv_supported=-1
> + elif [ -n "$kernel_err" ]; then
> + pstatus yellow UNKNOWN "$kernel_err"
> + pteinv_supported=-1
> + else
> +- if "${opt_arch_prefix}strings" "$kernel" |
> grep -Fq 'PTE Inversion'; then
> ++ if "@strings@" "$kernel" | @grep@ -Fq 'PTE
> Inversion'; then
> + pstatus green YES "found in kernel
> image"
> + _debug "pteinv: found pte inversion
> evidence in kernel image"
> + pteinv_supported=1
> +@@ -4694,7 +4694,7 @@ check_CVE_2018_3620_linux()
> + _info_nol "* PTE inversion enabled and active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -q
> 'Mitigation: PTE Inversion'; then
> ++ if echo "$fullmsg" | @grep@ -q
> 'Mitigation: PTE Inversion'; then
> + pstatus green YES
> + pteinv_active=1
> + else
> +@@ -4742,7 +4742,7 @@ check_CVE_2018_3620_bsd()
> + else
> + _debug "vmm module already loaded"
> + fi
> +- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> ++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> + #
> https://security.FreeBSD.org/patches/SA-18:09/l1tf-11.2.patch
> + # this is very difficult to detect that the kernel
> reserved the 0 page, but this fix
> + # is part of the exact same patch than the other L1TF
> CVE, so we detect it
> +@@ -4772,7 +4772,7 @@ check_CVE_2018_3646()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_3646_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_3646_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -4798,7 +4798,7 @@ check_CVE_2018_3646_linux()
> + if [ "$opt_live" = 1 ]; then
> + if ! [ -r
> /sys/module/kvm_intel/parameters/ept ]; then
> + pstatus blue N/A "the kvm_intel
> module is not loaded"
> +- elif [ "$(cat
> /sys/module/kvm_intel/parameters/ept)" = N ]; then
> ++ elif [ "$(@cat@
> /sys/module/kvm_intel/parameters/ept)" = N ]; then
> + pstatus green YES
> + ept_disabled=1
> + else
> +@@ -4810,15 +4810,15 @@ check_CVE_2018_3646_linux()
> +
> + _info "* Mitigation 2"
> + _info_nol " * L1D flush is supported by kernel: "
> +- if [ "$opt_live" = 1 ] && grep -qw flush_l1d
> "$procfs/cpuinfo"; then
> ++ if [ "$opt_live" = 1 ] && @grep@ -qw flush_l1d
> "$procfs/cpuinfo"; then
> + l1d_kernel="found flush_l1d in
> $procfs/cpuinfo"
> + fi
> + if [ -z "$l1d_kernel" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + l1d_kernel_err="missing
> '${opt_arch_prefix}strings' tool, please install it, usually it's in
> the binutils package"
> + elif [ -n "$kernel_err" ]; then
> + l1d_kernel_err="$kernel_err"
> +- elif "${opt_arch_prefix}strings" "$kernel" |
> grep -qw flush_l1d; then
> ++ elif "@strings@" "$kernel" | @grep@ -qw
> flush_l1d; then
> + l1d_kernel='found flush_l1d in kernel
> image'
> + fi
> + fi
> +@@ -4839,20 +4839,20 @@ check_CVE_2018_3646_linux()
> + # $l1dstatus is one of
> (auto|vulnerable|conditional cache flushes|cache flushes|EPT
> disabled|flush not necessary)
> + # $smtstatus is one of
> (vulnerable|disabled)
> + # can also just be "Not affected"
> +- if echo "$fullmsg" | grep -Eq -e 'Not
> affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not
> necessary)'; then
> ++ if echo "$fullmsg" | @grep@ -Eq -e
> 'Not affected' -e '(VMX:|L1D) (EPT disabled|vulnerable|flush not
> necessary)'; then
> + l1d_mode=0
> + pstatus yellow NO
> +- elif echo "$fullmsg" | grep -Eq
> '(VMX:|L1D) conditional cache flushes'; then
> ++ elif echo "$fullmsg" | @grep@ -Eq
> '(VMX:|L1D) conditional cache flushes'; then
> + l1d_mode=1
> + pstatus green YES
> "conditional flushes"
> +- elif echo "$fullmsg" | grep -Eq
> '(VMX:|L1D) cache flushes'; then
> ++ elif echo "$fullmsg" | @grep@ -Eq
> '(VMX:|L1D) cache flushes'; then
> + l1d_mode=2
> + pstatus green YES
> "unconditional flushes"
> + else
> + if is_xen_dom0; then
> +- l1d_xen_hardware=$(xl
> dmesg | grep 'Hardware features:' | grep 'L1D_FLUSH' | head -1)
> +-
> l1d_xen_hypervisor=$(xl
> dmesg | grep 'Xen settings:' | grep 'L1D_FLUSH' | head -1)
> +- l1d_xen_pv_domU=$(xl
> dmesg | grep 'PV L1TF shadowing:' | grep 'DomU enabled' | head -1)
> ++ l1d_xen_hardware=$(xl
> @dmesg@ | @grep@ 'Hardware features:' | @grep@ 'L1D_FLUSH' | @head@ -
> 1)
> ++ l1d_xen_hypervisor=$(
> xl @dmesg@ | @grep@ 'Xen settings:' | @grep@ 'L1D_FLUSH' | @head@ -1)
> ++ l1d_xen_pv_domU=$(xl
> @dmesg@ | @grep@ 'PV L1TF shadowing:' | @grep@ 'DomU enabled' |
> @head@ -1)
> +
> + if [ -n
> "$l1d_xen_hardware" ] && [ -n "$l1d_xen_hypervisor" ] && [ -n
> "$l1d_xen_pv_domU" ]; then
> + l1d_mode=5
> +@@ -4883,7 +4883,7 @@ check_CVE_2018_3646_linux()
> +
> + _info_nol " * Hardware-backed L1D flush supported: "
> + if [ "$opt_live" = 1 ]; then
> +- if grep -qw flush_l1d "$procfs/cpuinfo" || [
> -n "$l1d_xen_hardware" ]; then
> ++ if @grep@ -qw flush_l1d "$procfs/cpuinfo" ||
> [ -n "$l1d_xen_hardware" ]; then
> + pstatus green YES "performance impact
> of the mitigation will be greatly reduced"
> + else
> + pstatus blue NO "flush will be done
> in software, this is slower"
> +@@ -4955,7 +4955,7 @@ check_CVE_2018_3646_linux()
> + check_CVE_2018_3646_bsd()
> + {
> + _info_nol "* Kernel supports L1D flushing: "
> +- if sysctl hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> ++ if @sysctl@ hw.vmm.vmx.l1d_flush >/dev/null 2>&1; then
> + pstatus green YES
> + kernel_l1d_supported=1
> + else
> +@@ -4964,7 +4964,7 @@ check_CVE_2018_3646_bsd()
> + fi
> +
> + _info_nol "* L1D flushing is enabled: "
> +- kernel_l1d_enabled=$(sysctl -n hw.vmm.vmx.l1d_flush
> 2>/dev/null)
> ++ kernel_l1d_enabled=$(@sysctl@ -n hw.vmm.vmx.l1d_flush
> 2>/dev/null)
> + case "$kernel_l1d_enabled" in
> + 0) pstatus yellow NO;;
> + 1) pstatus green YES;;
> +@@ -5018,7 +5018,7 @@ check_CVE_2018_12127()
> + ###################
> + # MDSUM SECTION
> +
> +-# Microarchitectural Data Sampling Uncacheable Memory
> ++# Microarchitectural Data Sampling Uncacheable Memory
> + check_CVE_2019_11091()
> + {
> + cve='CVE-2019-11091'
> +@@ -5032,7 +5032,7 @@ check_mds()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_mds_linux "$cve"
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_mds_bsd "$cve"
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5043,7 +5043,7 @@ check_mds_bsd()
> + {
> + _info_nol "* Kernel supports using MD_CLEAR mitigation: "
> + if [ "$opt_live" = 1 ]; then
> +- if sysctl hw.mds_disable >/dev/null 2>&1; then
> ++ if @sysctl@ hw.mds_disable >/dev/null 2>&1; then
> + pstatus green YES
> + kernel_md_clear=1
> + else
> +@@ -5051,7 +5051,7 @@ check_mds_bsd()
> + kernel_md_clear=0
> + fi
> + else
> +- if grep -Fq hw.mds_disable $opt_kernel; then
> ++ if @grep@ -Fq hw.mds_disable $opt_kernel; then
> + pstatus green YES
> + kernel_md_clear=1
> + else
> +@@ -5061,8 +5061,8 @@ check_mds_bsd()
> + fi
> +
> + _info_nol "* CPU Hyper-Threading (SMT) is disabled: "
> +- if sysctl machdep.hyperthreading_allowed >/dev/null 2>&1;
> then
> +- kernel_smt_allowed=$(sysctl -n
> machdep.hyperthreading_allowed 2>/dev/null)
> ++ if @sysctl@ machdep.hyperthreading_allowed >/dev/null 2>&1;
> then
> ++ kernel_smt_allowed=$(@sysctl@ -n
> machdep.hyperthreading_allowed 2>/dev/null)
> + if [ "$kernel_smt_allowed" = 1 ]; then
> + pstatus yellow NO
> + else
> +@@ -5074,7 +5074,7 @@ check_mds_bsd()
> +
> + _info_nol "* Kernel mitigation is enabled: "
> + if [ "$kernel_md_clear" = 1 ]; then
> +- kernel_mds_enabled=$(sysctl -n hw.mds_disable
> 2>/dev/null)
> ++ kernel_mds_enabled=$(@sysctl@ -n hw.mds_disable
> 2>/dev/null)
> + else
> + kernel_mds_enabled=0
> + fi
> +@@ -5088,7 +5088,7 @@ check_mds_bsd()
> +
> + _info_nol "* Kernel mitigation is active: "
> + if [ "$kernel_md_clear" = 1 ]; then
> +- kernel_mds_state=$(sysctl -n hw.mds_disable_state
> 2>/dev/null)
> ++ kernel_mds_state=$(@sysctl@ -n hw.mds_disable_state
> 2>/dev/null)
> + else
> + kernel_mds_state=inactive
> + fi
> +@@ -5146,16 +5146,16 @@ check_mds_linux()
> + _info_nol "* Kernel supports using MD_CLEAR
> mitigation: "
> + kernel_md_clear=''
> + kernel_md_clear_can_tell=1
> +- if [ "$opt_live" = 1 ] && grep ^flags
> "$procfs/cpuinfo" | grep -qw md_clear; then
> ++ if [ "$opt_live" = 1 ] && @grep@ ^flags
> "$procfs/cpuinfo" | @grep@ -qw md_clear; then
> + kernel_md_clear="md_clear found in
> $procfs/cpuinfo"
> + pstatus green YES "$kernel_md_clear"
> + fi
> + if [ -z "$kernel_md_clear" ]; then
> +- if ! command -v "${opt_arch_prefix}strings"
> >/dev/null 2>&1; then
> ++ if ! command -v "@strings@" >/dev/null 2>&1;
> then
> + kernel_md_clear_can_tell=0
> + elif [ -n "$kernel_err" ]; then
> + kernel_md_clear_can_tell=0
> +- elif "${opt_arch_prefix}strings" "$kernel" |
> grep -q 'Clear CPU buffers'; then
> ++ elif "@strings@" "$kernel" | @grep@ -q 'Clear
> CPU buffers'; then
> + _debug "md_clear: found 'Clear CPU
> buffers' string in kernel image"
> + kernel_md_clear='found md_clear
> implementation evidence in kernel image'
> + pstatus green YES "$kernel_md_clear"
> +@@ -5171,7 +5171,7 @@ check_mds_linux()
> +
> + if [ "$opt_live" = 1 ] && [
> "$sys_interface_available" = 1 ]; then
> + _info_nol "* Kernel mitigation is enabled and
> active: "
> +- if echo "$fullmsg" | grep -qi ^mitigation;
> then
> ++ if echo "$fullmsg" | @grep@ -qi ^mitigation;
> then
> + mds_mitigated=1
> + pstatus green YES
> + else
> +@@ -5179,7 +5179,7 @@ check_mds_linux()
> + pstatus yellow NO
> + fi
> + _info_nol "* SMT is either mitigated or
> disabled: "
> +- if echo "$fullmsg" | grep -Eq 'SMT
> (disabled|mitigated)'; then
> ++ if echo "$fullmsg" | @grep@ -Eq 'SMT
> (disabled|mitigated)'; then
> + mds_smt_mitigated=1
> + pstatus green YES
> + else
> +@@ -5265,7 +5265,7 @@ check_CVE_2019_11135()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2019_11135_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2019_11135_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5286,7 +5286,7 @@ check_CVE_2019_11135_linux()
> + kernel_taa=''
> + if [ -n "$kernel_err" ]; then
> + kernel_taa_err="$kernel_err"
> +- elif grep -q 'tsx_async_abort' "$kernel"; then
> ++ elif @grep@ -q 'tsx_async_abort' "$kernel"; then
> + kernel_taa="found tsx_async_abort in kernel
> image"
> + fi
> + if [ -n "$kernel_taa" ]; then
> +@@ -5300,7 +5300,7 @@ check_CVE_2019_11135_linux()
> + _info_nol "* TAA mitigation enabled and active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qE
> '^Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qE
> '^Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5335,9 +5335,9 @@ check_CVE_2019_11135_linux()
> + else
> + if [ "$opt_paranoid" = 1 ]; then
> + # in paranoid mode, TSX or SMT enabled are
> not OK, even if TAA is mitigated
> +- if ! echo "$fullmsg" | grep -qF 'TSX
> disabled'; then
> ++ if ! echo "$fullmsg" | @grep@ -qF 'TSX
> disabled'; then
> + pvulnstatus $cve VULN "TSX must be
> disabled for full mitigation"
> +- elif echo "$fullmsg" | grep -qF 'SMT
> vulnerable'; then
> ++ elif echo "$fullmsg" | @grep@ -qF 'SMT
> vulnerable'; then
> + pvulnstatus $cve VULN "SMT
> (HyperThreading) must be disabled for full mitigation"
> + else
> + pvulnstatus $cve "$status" "$msg"
> +@@ -5367,7 +5367,7 @@ check_CVE_2018_12207()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2018_12207_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2018_12207_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5391,7 +5391,7 @@ check_CVE_2018_12207_linux()
> + if [ -n "$kernel_err" ]; then
> + kernel_itlbmh_err="$kernel_err"
> + # commit 5219505fcbb640e273a0d51c19c38de0100ec5a9
> +- elif grep -q 'itlb_multihit' "$kernel"; then
> ++ elif @grep@ -q 'itlb_multihit' "$kernel"; then
> + kernel_itlbmh="found itlb_multihit in kernel
> image"
> + fi
> + if [ -n "$kernel_itlbmh" ]; then
> +@@ -5405,7 +5405,7 @@ check_CVE_2018_12207_linux()
> + _info_nol "* iTLB Multihit mitigation enabled and
> active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qF
> 'Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qF
> 'Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5447,7 +5447,7 @@ check_CVE_2018_12207_linux()
> + check_CVE_2018_12207_bsd()
> + {
> + _info_nol "* Kernel supports disabling superpages for
> executable mappings under EPT: "
> +- kernel_2m_x_ept=$(sysctl -n vm.pmap.allow_2m_x_ept
> 2>/dev/null)
> ++ kernel_2m_x_ept=$(@sysctl@ -n vm.pmap.allow_2m_x_ept
> 2>/dev/null)
> + if [ -z "$kernel_2m_x_ept" ]; then
> + pstatus yellow NO
> + else
> +@@ -5484,7 +5484,7 @@ check_CVE_2020_0543()
> + _info "\033[1;34m$cve aka '$(cve2name "$cve")'\033[0m"
> + if [ "$os" = Linux ]; then
> + check_CVE_2020_0543_linux
> +- elif echo "$os" | grep -q BSD; then
> ++ elif echo "$os" | @grep@ -q BSD; then
> + check_CVE_2020_0543_bsd
> + else
> + _warn "Unsupported OS ($os)"
> +@@ -5505,7 +5505,7 @@ check_CVE_2020_0543_linux()
> + kernel_srbds=''
> + if [ -n "$kernel_err" ]; then
> + kernel_srbds_err="$kernel_err"
> +- elif grep -q 'Dependent on hypervisor' "$kernel";
> then
> ++ elif @grep@ -q 'Dependent on hypervisor' "$kernel";
> then
> + kernel_srbds="found SRBDS implementation
> evidence in kernel image. Your kernel is up to date for SRBDS
> mitigation"
> + fi
> + if [ -n "$kernel_srbds" ]; then
> +@@ -5518,7 +5518,7 @@ check_CVE_2020_0543_linux()
> + _info_nol "* SRBDS mitigation control is enabled and
> active: "
> + if [ "$opt_live" = 1 ]; then
> + if [ -n "$fullmsg" ]; then
> +- if echo "$fullmsg" | grep -qE
> '^Mitigation'; then
> ++ if echo "$fullmsg" | @grep@ -qE
> '^Mitigation'; then
> + pstatus green YES "$fullmsg"
> + else
> + pstatus yellow NO
> +@@ -5608,8 +5608,8 @@ fi
> + # now run the checks the user asked for
> + for cve in $supported_cve_list
> + do
> +- if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | grep -qw
> "$cve"; then
> +- check_"$(echo "$cve" | tr - _)"
> ++ if [ "$opt_cve_all" = 1 ] || echo "$opt_cve_list" | @grep@ -
> qw "$cve"; then
> ++ check_"$(echo "$cve" | @tr@ - _)"
> + _info
> + fi
> + done
> +@@ -5623,17 +5623,17 @@ if [ "$bad_accuracy" = 1 ]; then
> + _warn "We're missing some kernel info (see -v), accuracy
> might be reduced"
> + fi
> +
> +-_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | grep -v -F 'mockme=' |
> sort | tr "\n" '|')
> ++_vars=$(set | @grep@ -Ev '^[A-Z_[:space:]]' | @grep@ -v -F
> 'mockme=' | @sort@ | @tr@ "\n" '|')
> + _debug "variables at end of script: $_vars"
> +
> + if [ -n "$mockme" ] && [ "$opt_mock" = 1 ]; then
> +- if command -v "gzip" >/dev/null 2>&1; then
> ++ if command -v "@gzip@" >/dev/null 2>&1; then
> + # not a useless use of cat: gzipping cpuinfo directly
> doesn't work well
> + # shellcheck disable=SC2002
> +- if command -v "base64" >/dev/null 2>&1; then
> +- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c |
> base64 -w0)"
> +- elif command -v "uuencode" >/dev/null 2>&1; then
> +- mock_cpuinfo="$(cat /proc/cpuinfo | gzip -c |
> uuencode -m - | grep -Fv 'begin-base64' | grep -Fxv -- '====' | tr -d
> "\n")"
> ++ if command -v "@base64@" >/dev/null 2>&1; then
> ++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@
> -c | @base64@ -w0)"
> ++ elif command -v "@uuencode@" >/dev/null 2>&1; then
> ++ mock_cpuinfo="$(@cat@ /proc/cpuinfo | @gzip@
> -c | @uuencode@ -m - | @grep@ -Fv 'begin-base64' | @grep@ -Fxv --
> '====' | @tr@ -d "\n")"
> + fi
> + fi
> + if [ -n "$mock_cpuinfo" ]; then
> +@@ -5642,7 +5642,7 @@ if [ -n "$mockme" ] && [ "$opt_mock" = 1 ];
> then
> + fi
> + _info ""
> + # shellcheck disable=SC2046
> +- _warn "To mock this CPU, set those vars: "$(echo "$mockme" |
> sort -u)
> ++ _warn "To mock this CPU, set those vars: "$(echo "$mockme" |
> @sort@ -u)
> + fi
> +
> + if [ "$opt_explain" = 0 ]; then
> +--
> +2.38.1
> +
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-
> guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-
> checker-support-guix-system-kernel.patch
> new file mode 100644
> index 0000000000..afec52b418
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-
> system-kernel.patch
> @@ -0,0 +1,26 @@
> +From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Sat, 5 Nov 2022 23:22:31 +0800
> +Subject: [PATCH] Add support for Guix System kernel.
> +
> +---
> + spectre-meltdown-checker.sh | 2 ++
> + 1 file changed, 2 insertions(+)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 248a444..855a090 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
> + [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
> + # NixOS:
> + [ -e "/run/booted-system/kernel" ] &&
> opt_kernel="/run/booted-system/kernel"
> ++ # Guix System:
> ++ [ -e "/run/booted-system/kernel/bzImage" ] &&
> opt_kernel="/run/booted-system/kernel/bzImage"
> + # systemd kernel-install:
> + [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat
> /etc/machine-id)/$(uname -r)/linux"
> + # Clear Linux:
> +
> +base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
> +--
> +2.38.0
>
> base-commit: 2757de2e2b271d87f6f72ba4161c2225fbdc9e78
> --
> 2.38.1
Cheers
^ permalink raw reply [flat|nested] 12+ messages in thread
* [bug#59053] [PATCH v5] gnu: Add spectre-meltdown-checker.
2022-11-12 16:58 ` Liliana Marie Prikler
@ 2022-11-13 13:09 ` Hilton Chain via Guix-patches via
2022-11-13 22:02 ` bug#59053: " Liliana Marie Prikler
0 siblings, 1 reply; 12+ messages in thread
From: Hilton Chain via Guix-patches via @ 2022-11-13 13:09 UTC (permalink / raw)
To: Liliana Marie Prikler; +Cc: 59053
* gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
* gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch:
New file.
* gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch:
New file.
* gnu/local.mk (dist_patch_DATA): Add patches.
---
v4 -> v5: No more an extra patch for substitution.
gnu/local.mk | 2 +
gnu/packages/linux.scm | 130 ++++++++++
...ker-remove-builtin-firmware-database.patch | 243 ++++++++++++++++++
...n-checker-support-guix-system-kernel.patch | 26 ++
4 files changed, 401 insertions(+)
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
create mode 100644 gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
diff --git a/gnu/local.mk b/gnu/local.mk
index e3e02314bb..1e85790983 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1857,6 +1857,8 @@ dist_patch_DATA = \
%D%/packages/patches/syslinux-strip-gnu-property.patch \
%D%/packages/patches/snappy-add-O2-flag-in-CmakeLists.txt.patch \
%D%/packages/patches/snappy-add-inline-for-GCC.patch \
+ %D%/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch \
+ %D%/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch \
%D%/packages/patches/sphinxbase-fix-doxygen.patch \
%D%/packages/patches/spice-vdagent-glib-2.68.patch \
%D%/packages/patches/sssd-optional-systemd.patch \
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index fea33dfa0b..03b7ce46b0 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -9595,3 +9595,133 @@ (define-public edac-utils
error detection and correction (EDAC).")
(home-page "https://github.com/grondo/edac-utils")
(license license:gpl2+)))
+
+(define-public spectre-meltdown-checker
+ (package
+ (name "spectre-meltdown-checker")
+ (version "0.45")
+ (source (origin
+ (method git-fetch)
+ (uri (git-reference
+ (url "https://github.com/speed47/spectre-meltdown-checker")
+ (commit (string-append "v" version))))
+ (file-name (git-file-name name version))
+ (patches
+ (search-patches
+ "spectre-meltdown-checker-remove-builtin-firmware-database.patch"
+ ;; https://github.com/speed47/spectre-meltdown-checker/pull/441
+ "spectre-meltdown-checker-support-guix-system-kernel.patch"))
+ ;; Remove builtin firmware database.
+ (modules '((guix build utils)))
+ (snippet '(substitute* "spectre-meltdown-checker.sh"
+ (("^# [AI],.*") "")))
+ (sha256
+ (base32
+ "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
+ (build-system copy-build-system)
+ (arguments
+ (list
+ #:install-plan
+ #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-checker"))
+ #:phases
+ #~(modify-phases %standard-phases
+ (add-after 'unpack 'fixpath
+ (lambda* (#:key inputs #:allow-other-keys)
+ (define* (find-command inputs cmd #:optional (bin "bin")
+ #:key (prefix "") (suffix ""))
+ (string-append
+ prefix (search-input-file inputs (string-append bin "/" cmd))
+ suffix))
+ (substitute* "spectre-meltdown-checker.sh"
+ ;; ${opt_arch_prefix}CMD
+ (((string-append
+ "\\$\\{opt_arch_prefix\\}"
+ "\\<(nm|objdump|readelf|strings)\\>") all cmd)
+ (find-command inputs cmd))
+
+ ;; dd
+ (("(dd)( if=)" all cmd suffix)
+ (find-command inputs cmd #:suffix suffix))
+
+ ;; Commands safe to substitute directly.
+ (((string-append "\\<(" (string-join
+ (list "awk"
+ "basename"
+ "dirname"
+ "bunzip2"
+ "gunzip"
+ "gzip"
+ "lz4"
+ "lzop"
+ "modprobe"
+ "pgrep"
+ "rmmod"
+ "umount"
+ "unlzma"
+ "unxz"
+ "unzstd"
+ "uuencode")
+ "|")
+ ")\\>") all cmd)
+ (find-command inputs cmd))
+
+ ;; Search by suffix.
+ ;; CMD -
+ ;; CMD ^
+ (((string-append "\\<(" (string-join
+ (list "base64"
+ "cut"
+ "grep"
+ "head"
+ "id"
+ "mount"
+ "mktemp"
+ "od"
+ "perl"
+ "rm"
+ "uname"
+ "xargs")
+ "|")
+ ")\\>( [-^])") all cmd suffix)
+ (find-command inputs cmd #:suffix suffix))
+ ;; CMD |
+ (("(dmesg)( \\|)" all cmd suffix)
+ (find-command inputs cmd #:suffix suffix))
+
+ ;; Then prefix
+ ;; | CMD
+ (("(\\| )\\<(grep|sed|sort|stat|tr)\\>" all prefix cmd)
+ (find-command inputs cmd #:prefix prefix))
+ ;; $(CMD
+ (("(\\$\\( *)(sysctl)" all prefix cmd)
+ (find-command inputs cmd "sbin" #:prefix prefix))
+ (("(\\$\\()\\<(cat|find|grep|mount|nproc|stat|tr)\\>" all prefix cmd)
+ (find-command inputs cmd #:prefix prefix))
+ ;; if CMD
+ (("(if )(sysctl)" all prefix cmd)
+ (find-command inputs cmd "sbin" #:prefix prefix))
+ ;; command -v CMD
+ (("(command -v) \"*\\<(base64|nproc|perl|printf)\\>\"*" all prefix cmd)
+ (find-command inputs cmd #:prefix prefix))
+
+ ;; Cats are mysterious...
+ ;; cat <<EOF
+ (("(cat)( <<EOF)" all cmd suffix)
+ (find-command inputs cmd #:suffix suffix))
+ ;; cat "$
+ (("(cat)(\"\\$)" all cmd suffix)
+ (find-command inputs cmd #:suffix suffix))
+ ;; 'cat'
+ (("(')(cat)(')" all prefix cmd suffix)
+ (find-command inputs cmd #:prefix prefix #:suffix suffix))
+ ;; "cat"
+ (("(\")(cat)(\")" all prefix cmd suffix)
+ (find-command inputs cmd #:prefix prefix #:suffix suffix))))))))
+ (inputs (list kmod lz4 lzop perl procps sharutils util-linux zstd))
+ (home-page "https://github.com/speed47/spectre-meltdown-checker")
+ (synopsis "CPU vulnerability / mitigation checker")
+ (description
+ "This package provides a shell script to assess your system's resilience
+against the several transient execution CVEs that were published since early
+2018, and give you guidance as to how to mitigate them.")
+ (license license:gpl3)))
diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
new file mode 100644
index 0000000000..809763cf4f
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-firmware-database.patch
@@ -0,0 +1,243 @@
+From 340b08737e552c3c186863d76d123808d853a159 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 12 Nov 2022 22:45:24 +0800
+Subject: [PATCH] Remove builtin firmware database.
+
+1. Remove downloading function.
+2. Add option for supplying a local database.
+---
+ spectre-meltdown-checker.sh | 180 +++---------------------------------
+ 1 file changed, 15 insertions(+), 165 deletions(-)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 30f760c..ce46970 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -22,8 +22,6 @@ exit_cleanup()
+ [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm -f "$dumped_config"
+ [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm -f "$kerneltmp"
+ [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm -f "$kerneltmp2"
+- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm -f "$mcedb_tmp"
+- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm -rf "$intel_tmp"
+ [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug 2>/dev/null
+ [ "${mounted_procfs:-}" = 1 ] && umount "$procfs" 2>/dev/null
+ [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
+@@ -93,9 +91,7 @@ show_usage()
+ --vmm [auto,yes,no] override the detection of the presence of a hypervisor, default: auto
+ --allow-msr-write allow probing for write-only MSRs, this might produce kernel logs or be blocked by your system
+ --cpu [#,all] interact with CPUID and MSR of CPU core number #, or all (default: CPU core 0)
+- --update-fwdb update our local copy of the CPU microcodes versions database (using the awesome
+- MCExtractor project and the Intel firmwares GitHub repository)
+- --update-builtin-fwdb same as --update-fwdb but update builtin DB inside the script itself
++ --with-fwdb FILE supply the CPU microcodes versions database
+ --dump-mock-data used to mimick a CPU on an other system, mainly used to help debugging this script
+
+ Return codes:
+@@ -837,147 +833,6 @@ show_header()
+ _info
+ }
+
+-[ -z "$HOME" ] && HOME="$(getent passwd "$(whoami)" | cut -d: -f6)"
+-mcedb_cache="$HOME/.mcedb"
+-update_fwdb()
+-{
+- show_header
+-
+- set -e
+-
+- if [ -r "$mcedb_cache" ]; then
+- previous_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+- fi
+-
+- # first, download the MCE.db from the excellent platomav's MCExtractor project
+- mcedb_tmp="$(mktemp -t smc-mcedb-XXXXXX)"
+- mcedb_url='https://github.com/platomav/MCExtractor/raw/master/MCE.db'
+- _info_nol "Fetching MCE.db from the MCExtractor project... "
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$mcedb_url" -O "$mcedb_tmp"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
+- curl -sL "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+- elif command -v fetch >/dev/null 2>&1; then
+- fetch -q "$mcedb_url" -o "$mcedb_tmp"; ret=$?
+- else
+- echo ERROR "please install one of \`wget\`, \`curl\` of \`fetch\` programs"
+- return 1
+- fi
+- if [ "$ret" != 0 ]; then
+- echo ERROR "error $ret while downloading MCE.db"
+- return $ret
+- fi
+- echo DONE
+-
+- # second, get the Intel firmwares from GitHub
+- intel_tmp="$(mktemp -d -t smc-intelfw-XXXXXX)"
+- intel_url="https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/archive/main.zip"
+- _info_nol "Fetching Intel firmwares... "
+- ## https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files.git
+- if command -v wget >/dev/null 2>&1; then
+- wget -q "$intel_url" -O "$intel_tmp/fw.zip"; ret=$?
+- elif command -v curl >/dev/null 2>&1; then
+- curl -sL "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+- elif command -v fetch >/dev/null 2>&1; then
+- fetch -q "$intel_url" -o "$intel_tmp/fw.zip"; ret=$?
+- else
+- echo ERROR "please install one of \`wget\`, \`curl\` of \`fetch\` programs"
+- return 1
+- fi
+- if [ "$ret" != 0 ]; then
+- echo ERROR "error $ret while downloading Intel firmwares"
+- return $ret
+- fi
+- echo DONE
+-
+- # now extract MCEdb contents using sqlite
+- _info_nol "Extracting MCEdb data... "
+- if ! command -v sqlite3 >/dev/null 2>&1; then
+- echo ERROR "please install the \`sqlite3\` program"
+- return 1
+- fi
+- mcedb_revision=$(sqlite3 "$mcedb_tmp" "select revision from MCE")
+- if [ -z "$mcedb_revision" ]; then
+- echo ERROR "downloaded file seems invalid"
+- return 1
+- fi
+- sqlite3 "$mcedb_tmp" "alter table Intel add column origin text"
+- sqlite3 "$mcedb_tmp" "update Intel set origin='mce'"
+-
+- echo OK "MCExtractor database revision $mcedb_revision"
+-
+- # parse Intel firmwares to get their versions
+- _info_nol "Integrating Intel firmwares data to db... "
+- if ! command -v unzip >/dev/null 2>&1; then
+- echo ERROR "please install the \`unzip\` program"
+- return 1
+- fi
+- ( cd "$intel_tmp" && unzip fw.zip >/dev/null; )
+- if ! [ -d "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" ]; then
+- echo ERROR "expected the 'intel-ucode' folder in the downloaded zip file"
+- return 1
+- fi
+-
+- if ! command -v iucode_tool >/dev/null 2>&1; then
+- if ! command -v iucode-tool >/dev/null 2>&1; then
+- echo ERROR "please install the \`iucode-tool\` program"
+- return 1
+- else
+- iucode_tool="iucode-tool"
+- fi
+- else
+- iucode_tool="iucode_tool"
+- fi
+- # 079/001: sig 0x000106c2, pf_mask 0x01, 2009-04-10, rev 0x0217, size 5120
+- # 078/004: sig 0x000106ca, pf_mask 0x10, 2009-08-25, rev 0x0107, size 5120
+- $iucode_tool -l "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/intel-ucode" | grep -wF sig | while read -r _line
+- do
+- _line=$( echo "$_line" | tr -d ',')
+- _cpuid=$( echo "$_line" | awk '{print $3}')
+- _cpuid=$(( _cpuid ))
+- _cpuid=$(printf "0x%08X" "$_cpuid")
+- _date=$( echo "$_line" | awk '{print $6}' | tr -d '-')
+- _version=$(echo "$_line" | awk '{print $8}')
+- _version=$(( _version ))
+- _version=$(printf "0x%08X" "$_version")
+- _sqlstm="$(printf "INSERT INTO Intel (origin,cpuid,version,yyyymmdd) VALUES (\"%s\",\"%s\",\"%s\",\"%s\");" "intel" "$(printf "%08X" "$_cpuid")" "$(printf "%08X" "$_version")" "$_date")"
+- sqlite3 "$mcedb_tmp" "$_sqlstm"
+- done
+- _intel_timestamp=$(stat -c %Y "$intel_tmp/Intel-Linux-Processor-Microcode-Data-Files-main/license" 2>/dev/null)
+- if [ -n "$_intel_timestamp" ]; then
+- # use this date, it matches the last commit date
+- _intel_latest_date=$(date +%Y%m%d -d @"$_intel_timestamp")
+- else
+- echo "Falling back to the latest microcode date"
+- _intel_latest_date=$(sqlite3 "$mcedb_tmp" "SELECT yyyymmdd from Intel WHERE origin = 'intel' ORDER BY yyyymmdd DESC LIMIT 1;")
+- fi
+- echo DONE "(version $_intel_latest_date)"
+-
+- dbversion="$mcedb_revision+i$_intel_latest_date"
+-
+- if [ "$1" != builtin ] && [ -n "$previous_dbversion" ] && [ "$previous_dbversion" = "v$dbversion" ]; then
+- echo "We already have this version locally, no update needed"
+- return 0
+- fi
+-
+- _info_nol "Building local database... "
+- {
+- echo "# Spectre & Meltdown Checker";
+- echo "# %%% MCEDB v$dbversion";
+- sqlite3 "$mcedb_tmp" "SELECT '# I,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM Intel AS t1 LEFT OUTER JOIN Intel AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- sqlite3 "$mcedb_tmp" "SELECT '# A,0x'||t1.cpuid||',0x'||MAX(t1.version)||','||t1.yyyymmdd FROM AMD AS t1 LEFT OUTER JOIN AMD AS t2 ON t2.cpuid=t1.cpuid AND t2.yyyymmdd > t1.yyyymmdd WHERE t2.yyyymmdd IS NULL GROUP BY t1.cpuid ORDER BY t1.cpuid ASC;" | grep -v '^# .,0x00000000,';
+- } > "$mcedb_cache"
+- echo DONE "(version $dbversion)"
+-
+- if [ "$1" = builtin ]; then
+- newfile=$(mktemp -t smc-builtin-XXXXXX)
+- awk '/^# %%% MCEDB / { exit }; { print }' "$0" > "$newfile"
+- awk '{ if (NR>1) { print } }' "$mcedb_cache" >> "$newfile"
+- cat "$newfile" > "$0"
+- rm -f "$newfile"
+- fi
+-}
+-
+ parse_opt_file()
+ {
+ # parse_opt_file option_name option_value
+@@ -1067,12 +922,15 @@ while [ -n "${1:-}" ]; do
+ # deprecated, kept for compatibility
+ opt_explain=0
+ shift
+- elif [ "$1" = "--update-fwdb" ] || [ "$1" = "--update-mcedb" ]; then
+- update_fwdb
+- exit $?
+- elif [ "$1" = "--update-builtin-fwdb" ] || [ "$1" = "--update-builtin-mcedb" ]; then
+- update_fwdb builtin
+- exit $?
++ elif [ "$1" = "--with-fwdb" ] || [ "$1" = "--with-mcedb" ]; then
++ opt_fwdb=$2
++ if [ -f "$opt_fwdb" ]; then
++ mcedb_cache=$2
++ else
++ echo "$0: error: --with-fwdb should be a file, got '$opt_fwdb'" >&2
++ exit 255
++ fi
++ shift 2
+ elif [ "$1" = "--dump-mock-data" ]; then
+ opt_mock=1
+ shift
+@@ -2033,21 +1891,11 @@ is_xen_domU()
+ fi
+ }
+
+-builtin_dbversion=$(awk '/^# %%% MCEDB / { print $4 }' "$0")
+ if [ -r "$mcedb_cache" ]; then
+ # we have a local cache file, but it might be older than the builtin version we have
+ local_dbversion=$( awk '/^# %%% MCEDB / { print $4 }' "$mcedb_cache")
+- # sort -V sorts by version number
+- older_dbversion=$(printf "%b\n%b" "$local_dbversion" "$builtin_dbversion" | sort -V | head -n1)
+- if [ "$older_dbversion" = "$builtin_dbversion" ]; then
+- mcedb_source="$mcedb_cache"
+- mcedb_info="local firmwares DB $local_dbversion"
+- fi
+-fi
+-# if mcedb_source is not set, either we don't have a local cached db, or it is older than the builtin db
+-if [ -z "${mcedb_source:-}" ]; then
+- mcedb_source="$0"
+- mcedb_info="builtin firmwares DB $builtin_dbversion"
++ mcedb_source="$mcedb_cache"
++ mcedb_info="local firmwares DB $local_dbversion"
+ fi
+ read_mcedb()
+ {
+@@ -2063,7 +1911,9 @@ is_latest_known_ucode()
+ return 2
+ fi
+ ucode_latest="latest microcode version for your CPU model is unknown"
+- if is_intel; then
++ if [ -z "$mcedb_source" ]; then
++ return 2
++ elif is_intel; then
+ cpu_brand_prefix=I
+ elif is_amd; then
+ cpu_brand_prefix=A
+--
+2.38.1
+
diff --git a/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
new file mode 100644
index 0000000000..afec52b418
--- /dev/null
+++ b/gnu/packages/patches/spectre-meltdown-checker-support-guix-system-kernel.patch
@@ -0,0 +1,26 @@
+From 5b757d930ec0cf102b03fb9817d17e06c72e74b3 Mon Sep 17 00:00:00 2001
+From: Hilton Chain <hako@ultrarare.space>
+Date: Sat, 5 Nov 2022 23:22:31 +0800
+Subject: [PATCH] Add support for Guix System kernel.
+
+---
+ spectre-meltdown-checker.sh | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh
+index 248a444..855a090 100755
+--- a/spectre-meltdown-checker.sh
++++ b/spectre-meltdown-checker.sh
+@@ -2251,6 +2251,8 @@ if [ "$opt_live" = 1 ]; then
+ [ -e "/boot/kernel-genkernel-$(uname -m)-$(uname -r)" ] && opt_kernel="/boot/kernel-genkernel-$(uname -m)-$(uname -r)"
+ # NixOS:
+ [ -e "/run/booted-system/kernel" ] && opt_kernel="/run/booted-system/kernel"
++ # Guix System:
++ [ -e "/run/booted-system/kernel/bzImage" ] && opt_kernel="/run/booted-system/kernel/bzImage"
+ # systemd kernel-install:
+ [ -e "/etc/machine-id" ] && [ -e "/boot/$(cat /etc/machine-id)/$(uname -r)/linux" ] && opt_kernel="/boot/$(cat /etc/machine-id)/$(uname -r)/linux"
+ # Clear Linux:
+
+base-commit: a6c943d38f315f339697ec26e7374a09b88f2183
+--
+2.38.0
base-commit: 80d10fa413cf43439f9ab94b6f69fe68811156da
--
2.38.1
^ permalink raw reply related [flat|nested] 12+ messages in thread
* bug#59053: [PATCH v5] gnu: Add spectre-meltdown-checker.
2022-11-13 13:09 ` [bug#59053] [PATCH v5] " Hilton Chain via Guix-patches via
@ 2022-11-13 22:02 ` Liliana Marie Prikler
0 siblings, 0 replies; 12+ messages in thread
From: Liliana Marie Prikler @ 2022-11-13 22:02 UTC (permalink / raw)
To: Hilton Chain; +Cc: 59053-done
Am Sonntag, dem 13.11.2022 um 21:09 +0800 schrieb Hilton Chain:
> * gnu/packages/linux.scm (spectre-meltdown-checker): New variable.
> * gnu/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch:
> New file.
> * gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch:
> New file.
> * gnu/local.mk (dist_patch_DATA): Add patches.
I renamed the patches for the ChangeLog, slightly rewrote their
explanations, ...
> gnu/local.mk | 2 +
> gnu/packages/linux.scm | 130 ++++++++++
> ...ker-remove-builtin-firmware-database.patch | 243
> ++++++++++++++++++
> ...n-checker-support-guix-system-kernel.patch | 26 ++
> 4 files changed, 401 insertions(+)
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> remove-builtin-firmware-database.patch
> create mode 100644 gnu/packages/patches/spectre-meltdown-checker-
> support-guix-system-kernel.patch
>
> diff --git a/gnu/local.mk b/gnu/local.mk
> index e3e02314bb..1e85790983 100644
> --- a/gnu/local.mk
> +++ b/gnu/local.mk
> @@ -1857,6 +1857,8 @@ dist_patch_DATA
> = \
> %D%/packages/patches/syslinux-strip-gnu-property.patch \
> %D%/packages/patches/snappy-add-O2-flag-in-
> CmakeLists.txt.patch \
> %D%/packages/patches/snappy-add-inline-for-GCC.patch \
> + %D%/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch \
> + %D%/packages/patches/spectre-meltdown-checker-support-guix-system-
> kernel.patch \
> %D%/packages/patches/sphinxbase-fix-doxygen.patch \
> %D%/packages/patches/spice-vdagent-glib-2.68.patch \
> %D%/packages/patches/sssd-optional-systemd.patch \
> diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
> index fea33dfa0b..03b7ce46b0 100644
> --- a/gnu/packages/linux.scm
> +++ b/gnu/packages/linux.scm
> @@ -9595,3 +9595,133 @@ (define-public edac-utils
> error detection and correction (EDAC).")
> (home-page "https://github.com/grondo/edac-utils")
> (license license:gpl2+)))
> +
> +(define-public spectre-meltdown-checker
> + (package
> + (name "spectre-meltdown-checker")
> + (version "0.45")
> + (source (origin
> + (method git-fetch)
> + (uri (git-reference
> + (url
> "https://github.com/speed47/spectre-meltdown-checker")
> + (commit (string-append "v" version))))
> + (file-name (git-file-name name version))
> + (patches
> + (search-patches
> + "spectre-meltdown-checker-remove-builtin-firmware-
> database.patch"
> + ;;
> https://github.com/speed47/spectre-meltdown-checker/pull/441
> + "spectre-meltdown-checker-support-guix-system-
> kernel.patch"))
> + ;; Remove builtin firmware database.
> + (modules '((guix build utils)))
> + (snippet '(substitute* "spectre-meltdown-checker.sh"
> + (("^# [AI],.*") "")))
> + (sha256
> + (base32
> +
> "1xx8h5791lhc2xw0dcbzjkklzvlxwxkjzh8di4g8divfy24fqsn8"))))
> + (build-system copy-build-system)
> + (arguments
> + (list
> + #:install-plan
> + #~'(("spectre-meltdown-checker.sh" "bin/spectre-meltdown-
> checker"))
> + #:phases
> + #~(modify-phases %standard-phases
> + (add-after 'unpack 'fixpath
> + (lambda* (#:key inputs #:allow-other-keys)
> + (define* (find-command inputs cmd #:optional (bin
> "bin")
> + #:key (prefix "") (suffix ""))
> + (string-append
> + prefix (search-input-file inputs (string-append bin
> "/" cmd))
> + suffix))
> + (substitute* "spectre-meltdown-checker.sh"
> + ;; ${opt_arch_prefix}CMD
> + (((string-append
> + "\\$\\{opt_arch_prefix\\}"
> + "\\<(nm|objdump|readelf|strings)\\>") all cmd)
> + (find-command inputs cmd))
> +
> + ;; dd
> + (("(dd)( if=)" all cmd suffix)
> + (find-command inputs cmd #:suffix suffix))
> +
> + ;; Commands safe to substitute directly.
> + (((string-append "\\<(" (string-join
> + (list "awk"
> + "basename"
> + "dirname"
> + "bunzip2"
> + "gunzip"
> + "gzip"
> + "lz4"
> + "lzop"
> + "modprobe"
> + "pgrep"
> + "rmmod"
> + "umount"
> + "unlzma"
> + "unxz"
> + "unzstd"
> + "uuencode")
> + "|")
> + ")\\>") all cmd)
replaced these "clever" tricks with dumber ones,
> + (find-command inputs cmd))
> +
> + ;; Search by suffix.
> + ;; CMD -
> + ;; CMD ^
> + (((string-append "\\<(" (string-join
> + (list "base64"
> + "cut"
> + "grep"
> + "head"
> + "id"
> + "mount"
> + "mktemp"
> + "od"
> + "perl"
> + "rm"
> + "uname"
> + "xargs")
> + "|")
> + ")\\>( [-^])") all cmd suffix)
> + (find-command inputs cmd #:suffix suffix))
> + ;; CMD |
> + (("(dmesg)( \\|)" all cmd suffix)
> + (find-command inputs cmd #:suffix suffix))
> +
> + ;; Then prefix
> + ;; | CMD
> + (("(\\| )\\<(grep|sed|sort|stat|tr)\\>" all prefix
> cmd)
> + (find-command inputs cmd #:prefix prefix))
> + ;; $(CMD
> + (("(\\$\\( *)(sysctl)" all prefix cmd)
> + (find-command inputs cmd "sbin" #:prefix prefix))
> +
> (("(\\$\\()\\<(cat|find|grep|mount|nproc|stat|tr)\\>" all prefix cmd)
> + (find-command inputs cmd #:prefix prefix))
> + ;; if CMD
> + (("(if )(sysctl)" all prefix cmd)
> + (find-command inputs cmd "sbin" #:prefix prefix))
> + ;; command -v CMD
> + (("(command -v)
> \"*\\<(base64|nproc|perl|printf)\\>\"*" all prefix cmd)
> + (find-command inputs cmd #:prefix prefix))
> +
> + ;; Cats are mysterious...
> + ;; cat <<EOF
> + (("(cat)( <<EOF)" all cmd suffix)
> + (find-command inputs cmd #:suffix suffix))
> + ;; cat "$
> + (("(cat)(\"\\$)" all cmd suffix)
> + (find-command inputs cmd #:suffix suffix))
> + ;; 'cat'
> + (("(')(cat)(')" all prefix cmd suffix)
> + (find-command inputs cmd #:prefix prefix #:suffix
> suffix))
> + ;; "cat"
> + (("(\")(cat)(\")" all prefix cmd suffix)
> + (find-command inputs cmd #:prefix prefix #:suffix
> suffix))))))))
> + (inputs (list kmod lz4 lzop perl procps sharutils util-linux
> zstd))
> + (home-page
> "https://github.com/speed47/spectre-meltdown-checker")
> + (synopsis "CPU vulnerability / mitigation checker")
> + (description
> + "This package provides a shell script to assess your system's
> resilience
> +against the several transient execution CVEs that were published
> since early
> +2018, and give you guidance as to how to mitigate them.")
> + (license license:gpl3)))
> diff --git a/gnu/packages/patches/spectre-meltdown-checker-remove-
> builtin-firmware-database.patch b/gnu/packages/patches/spectre-
> meltdown-checker-remove-builtin-firmware-database.patch
> new file mode 100644
> index 0000000000..809763cf4f
> --- /dev/null
> +++ b/gnu/packages/patches/spectre-meltdown-checker-remove-builtin-
> firmware-database.patch
> @@ -0,0 +1,243 @@
> +From 340b08737e552c3c186863d76d123808d853a159 Mon Sep 17 00:00:00
> 2001
> +From: Hilton Chain <hako@ultrarare.space>
> +Date: Sat, 12 Nov 2022 22:45:24 +0800
> +Subject: [PATCH] Remove builtin firmware database.
> +
> +1. Remove downloading function.
> +2. Add option for supplying a local database.
> +---
> + spectre-meltdown-checker.sh | 180 +++------------------------------
> ---
> + 1 file changed, 15 insertions(+), 165 deletions(-)
> +
> +diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-
> checker.sh
> +index 30f760c..ce46970 100755
> +--- a/spectre-meltdown-checker.sh
> ++++ b/spectre-meltdown-checker.sh
> +@@ -22,8 +22,6 @@ exit_cleanup()
> + [ -n "${dumped_config:-}" ] && [ -f "$dumped_config" ] && rm
> -f "$dumped_config"
> + [ -n "${kerneltmp:-}" ] && [ -f "$kerneltmp" ] && rm
> -f "$kerneltmp"
> + [ -n "${kerneltmp2:-}" ] && [ -f "$kerneltmp2" ] && rm
> -f "$kerneltmp2"
> +- [ -n "${mcedb_tmp:-}" ] && [ -f "$mcedb_tmp" ] && rm
> -f "$mcedb_tmp"
> +- [ -n "${intel_tmp:-}" ] && [ -d "$intel_tmp" ] && rm
> -rf "$intel_tmp"
> + [ "${mounted_debugfs:-}" = 1 ] && umount /sys/kernel/debug
> 2>/dev/null
> + [ "${mounted_procfs:-}" = 1 ] && umount "$procfs"
> 2>/dev/null
> + [ "${insmod_cpuid:-}" = 1 ] && rmmod cpuid 2>/dev/null
> +@@ -93,9 +91,7 @@ show_usage()
> + --vmm [auto,yes,no] override the detection of the
> presence of a hypervisor, default: auto
> + --allow-msr-write allow probing for write-only
> MSRs, this might produce kernel logs or be blocked by your system
> + --cpu [#,all] interact with CPUID and MSR
> of CPU core number #, or all (default: CPU core 0)
> +- --update-fwdb update our local copy of the
> CPU microcodes versions database (using the awesome
> +- MCExtractor project and the
> Intel firmwares GitHub repository)
> +- --update-builtin-fwdb same as --update-fwdb but
> update builtin DB inside the script itself
> ++ --with-fwdb FILE supply the CPU microcodes
> versions database
and added a note regarding the (lack of) freedom for proprietary
microcode.
I also added your name and email to the authors of linux.scm, since
this was a very non-trivial package.
Cheers
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2022-11-13 22:03 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-11-05 15:57 [bug#59053] [PATCH] gnu: Add spectre-meltdown-checker Hilton Chain via Guix-patches via
2022-11-05 16:45 ` Liliana Marie Prikler
2022-11-11 11:10 ` [bug#59053] [PATCH v2] " Hilton Chain via Guix-patches via
2022-11-11 15:13 ` Liliana Marie Prikler
2022-11-12 12:14 ` [bug#59053] [PATCH v3] " Hilton Chain via Guix-patches via
2022-11-12 12:28 ` Liliana Marie Prikler
2022-11-12 12:50 ` Hilton Chain via Guix-patches via
2022-11-12 13:40 ` Liliana Marie Prikler
2022-11-12 15:15 ` [bug#59053] [PATCH v4] " Hilton Chain via Guix-patches via
2022-11-12 16:58 ` Liliana Marie Prikler
2022-11-13 13:09 ` [bug#59053] [PATCH v5] " Hilton Chain via Guix-patches via
2022-11-13 22:02 ` bug#59053: " Liliana Marie Prikler
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.