Works as expected.
$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline
$ uname -a
Linux unknown 4.14.14-300.fc27.x86_64 #1 SMP Fri Jan 19 13:19:54 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
Updated rpms and rebooted (note I have also new microcode_ctl). I ran also the test suite (both tests pass) and submitted results.
One of the enhancements comparing to -11 is that it now shows details under /proc/cpuinfo in 'bugs' section - in my case: cpu_meltdown spectre_v1 spectre_v2
$ uname -a
Linux unknown 4.14.13-300.fc27.x86_64 #1 SMP Thu Jan 11 04:00:01 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
$ dmesg | grep micro [ 0.000000] microcode: microcode updated early to revision 0x80, date = 2018-01-04 [ 0.713758] microcode: sig=0x806e9, pf=0x80, revision=0x80 [ 0.713896] microcode: Microcode Update Driver: v2.2. $ rpm -q microcode_ctl microcode_ctl-2.1-20.fc27.x86_64
LGTM
LGTM
Fixed #1214973 for me.
Fixes #1209227
Fixed issue with BZ1109554
Works for me. I noticed non-fatal POSTUN scriptlet failure information. Information posted into BZ.
This update broke wifi on my MacBook Air, Fedora Asahi. I saw wifi networks, but couldn't log in to any of them. Downgrade of single package back to wpa_supplicant-2.10-10.fc40 fixed it.