diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index d4d43d2..4285470 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -536,6 +536,7 @@ pstatus() fi [ -n "$3" ] && _info_nol " ($3)" _info + unset col } # Print the final status of a vulnerability (incl. batch mode) @@ -1318,7 +1319,7 @@ read_msr() if [ ! -r /dev/cpu/"$2"/msr ]; then return 200 # permission error fi - if ! dd if=/dev/cpu/"$2"/msr bs=8 count=1 skip="$_msrindex" iflag=skip_bytes 2>/dev/null; then + if ! dd if=/dev/cpu/"$2"/msr bs=8 count=1 skip="$_msrindex" iflag=skip_bytes >/dev/null 2>&1; then return 1 fi read_msr_value=$(dd if=/dev/cpu/"$2"/msr bs=8 count=1 skip="$_msrindex" iflag=skip_bytes 2>/dev/null | od -t u1 -A n) @@ -2452,6 +2453,9 @@ if [ "$opt_variant3" = 1 ] || [ "$opt_allvariants" = 1 ]; then _info fi +_vars=$(set | grep -Ev '^[A-Z_[:space:]]' | sort | tr "\n" '|') +_debug "variables at end of script: $_vars" + _info "A false sense of security is worse than no security at all, see --disclaimer" if [ "$opt_batch" = 1 ] && [ "$opt_batch_format" = "nrpe" ]; then