From 34ef5ef21b35342801a45f8f00ca43059846bad4 Mon Sep 17 00:00:00 2001 From: Vincent Brillault Date: Mon, 8 Jan 2018 12:41:02 +0100 Subject: [PATCH] Delay umount (for RedHat access to pti_enable) --- spectre-meltdown-checker.sh | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/spectre-meltdown-checker.sh b/spectre-meltdown-checker.sh index 9b78da3..367b3e0 100755 --- a/spectre-meltdown-checker.sh +++ b/spectre-meltdown-checker.sh @@ -199,11 +199,6 @@ case "$ibrs_enabled" in *) pstatus yellow unknown;; esac -if [ "$mounted_debugfs" = 1 ]; then - # umount debugfs if we did mount it ourselves - umount /sys/kernel/debug -fi - /bin/echo "* Mitigation 2" /bin/echo -n "* Kernel compiled with retpolines: " # We check the RETPOLINE kernel options @@ -301,6 +296,11 @@ else pstatus red NO fi +if [ "$mounted_debugfs" = 1 ]; then + # umount debugfs if we did mount it ourselves + umount /sys/kernel/debug +fi + /bin/echo -ne "> \033[46m\033[30mSTATUS:\033[0m " if grep -q AMD /proc/cpuinfo; then pstatus green "NOT VULNERABLE" "your CPU is not vulnerable as per the vendor"