From f9f7600ba5cae58d84f2124cca0828708e6f4738 Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Wed, 28 Aug 2019 14:11:49 +0300 Subject: [PATCH] operating-systems: remove update-grub, close li tags --- _includes/sections/operating-systems.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html index e356ad90..2a34f307 100644 --- a/_includes/sections/operating-systems.html +++ b/_includes/sections/operating-systems.html @@ -53,11 +53,11 @@ tor="http://sejnfjrq6szgca7v.onion"

The following steps can be took to enable the full mitigation assuming your system/distribution uses grub and supports /etc/default/grub.d/:

    -
  1. sudo mkdir /etc/default/grub.d/ to create a directory for additional grub configuration +
  2. sudo mkdir /etc/default/grub.d/ to create a directory for additional grub configuration
  3. echo GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT mds=full,nosmt" | sudo tee /etc/default/grub.d/mds.conf to create a new grub config file source with the echoed content
  4. -
  5. sudo grub-mkconfig -o /boot/grub/grub.cfg (or on Debian/Ubuntu based distributions sudo update-grub to generate a new config file including this new kernel flag -
  6. sudo reboot to reboot -
  7. afterward the reboot check tail -n +1 /sys/devices/system/cpu/vulnerabilities/* again to see that MDS now says SMT disabled. +
  8. sudo grub-mkconfig -o /boot/grub/grub.cfg to generate a new config file including this new kernel flag
  9. +
  10. sudo reboot to reboot
  11. +
  12. afterward the reboot check tail -n +1 /sys/devices/system/cpu/vulnerabilities/* again to see that MDS now says SMT disabled.
Further reading