From f497fccf2b998ce5043ad430dd9867f8ac90f0f4 Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Sat, 31 Aug 2019 11:07:39 +0300 Subject: [PATCH] operating-systems: mention macOS link --- _includes/sections/operating-systems.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index e83d4169..0c944bff 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -43,7 +43,7 @@ tor="http://sejnfjrq6szgca7v.onion"

Remember to check CPU vulnerability mitigations

-

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily.

+

This also affects Windows 10, but it doesn't expose this information or mitigation instructions as easily. MacOS users check How to enable full mitigation for Microarchitectural Data Sampling (MDS) vulnerabilities on Apple Support

When running a enough recent kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*. By using tail -n +1 instead of cat the file names are also visible.