diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index c93efb09..3347c591 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -43,11 +43,13 @@ tor="http://sejnfjrq6szgca7v.onion"

Remember to check CPU vulnerability mitigations

-

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily.

+

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily.

When running a enough recent kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*. By using tail -n +1 instead of cat the file names are also visible.

-

In case you have a Intel CPU, you will likely see that MDS - Microarchitectural Data Sampling is only partially mitigated ("SMT vulnerable"), unless you have disabled it in UEFI BIOS as the full mitigation disables Simultaneous multithreading which may be the cause of the highest performance impact.

+

+ In case you have an Intel CPU, you may notice "SMT vulnerable" display after running the tail command. To mitigate this, disable hyper-threading from the UEFI/BIOS. You can also take the following mitigation steps below if your system/distribution uses GRUB and supports /etc/default/grub.d/: +

The following steps can be took to enable the full mitigation assuming your system/distribution uses grub and supports /etc/default/grub.d/: