Continuing the discussion from [Stable Update] 2018-01-12 - Kernels, Microcodes, Nvidia, Firefox, Boost, Cleanup:
The intel microcode has been updated, but,
Aren’t the vulnerabilities not fixable at microcode level? Wasn’t this why the KPTI was released at all?
Quoting from Intel,
While the regular approach to getting this microcode update is via a BIOS update, Intel realizes that this can be an administrative hassle. The Linux* operating system has a mechanism to update the microcode after booting. For example, this file will be used by the operating system mechanism if the file is placed in the /etc/firmware directory of the Linux system
I used to think that BIOS update was the only way to update microcodes. Can someone elaborate how this Linux trickery works? How does putting a file in /etc/firmware updates the microcode?