![spectre_v2를 담당하는 모듈을 확인하는 방법은 무엇입니까?](https://linux55.com/image/154430/spectre_v2%EB%A5%BC%20%EB%8B%B4%EB%8B%B9%ED%95%98%EB%8A%94%20%EB%AA%A8%EB%93%88%EC%9D%84%20%ED%99%95%EC%9D%B8%ED%95%98%EB%8A%94%20%EB%B0%A9%EB%B2%95%EC%9D%80%20%EB%AC%B4%EC%97%87%EC%9E%85%EB%8B%88%EA%B9%8C%3F.png)
SERVER:~ # cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
Mitigation: Full generic retpoline, IBPB, STIBP, RSB filling - vulnerable module loaded
SERVER:~ #
질문: 그런데 lsmod(?)의 어떤 모듈이 spectre_v2에 취약한지 어떻게 감지할 수 있을까요? SLES 12.3.
답변1
SERVER:~ # awk '{module=$1; retpcheck="modinfo "module" | grep -c retpoline"; retpcheck | getline found; close(retpcheck); if (!found) {print "VULNERABLE - No Retpoline found - "module}}' /proc/modules
VULNERABLE - No Retpoline found - mlx4_ib
VULNERABLE - No Retpoline found - mlx4_en
VULNERABLE - No Retpoline found - mlx4_core
VULNERABLE - No Retpoline found - mlx5_ib
VULNERABLE - No Retpoline found - mlx5_core
VULNERABLE - No Retpoline found - mlxfw
VULNERABLE - No Retpoline found - mlx_compat
SERVER:~ #