Re: [PATCH 0/7] IBRS patch series

From: Justin Forbes
Date: Thu Jan 04 2018 - 14:05:42 EST


On Thu, Jan 4, 2018 at 11:56 AM, Tim Chen <tim.c.chen@xxxxxxxxxxxxxxx> wrote:
> This patch series enables the basic detection and usage of x86 indirect
> branch speculation feature. It enables the indirect branch restricted
> speculation (IBRS) on kernel entry and disables it on exit.
> It enumerates the indirect branch prediction barrier (IBPB).
>
> The x86 IBRS feature requires corresponding microcode support.
> It mitigates the variant 2 vulnerability described in
> https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
>

Are there plans to make the corresponding microcode support available?