From a6f138a3830b39f78f5d3e2abbab0719760b0a2b Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Wed, 28 Aug 2019 13:58:39 +0300 Subject: [PATCH] operating-systems: address feedback, fix typo --- _includes/sections/operating-systems.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index 047253f3..e356ad90 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -55,7 +55,7 @@ tor="http://sejnfjrq6szgca7v.onion"
  1. sudo mkdir /etc/default/grub.d/ to create a directory for additional grub configuration
  2. echo GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT mds=full,nosmt" | sudo tee /etc/default/grub.d/mds.conf to create a new grub config file source with the echoed content
  3. -
  4. sudo update-grub to generate a new config file including these kernel flags +
  5. sudo grub-mkconfig -o /boot/grub/grub.cfg (or on Debian/Ubuntu based distributions sudo update-grub to generate a new config file including this new kernel flag
  6. sudo reboot to reboot
  7. afterward the reboot check tail -n +1 /sys/devices/system/cpu/vulnerabilities/* again to see that MDS now says SMT disabled.