diff options
author | Jeremy Cline <jcline@redhat.com> | 2019-12-04 13:55:02 -0500 |
---|---|---|
committer | Jeremy Cline <jcline@redhat.com> | 2019-12-04 16:45:42 -0500 |
commit | cce01a3bcfec33e7e56b9cdcd5024a8d70f25d8e (patch) | |
tree | dce598ebab8c49f22bb85c5751e221f9daee57b7 /mod-extra-blacklist.sh | |
parent | 983730bdf1b2b5cae0e755b4c81bf96a9c3bc154 (diff) | |
download | kernel-cce01a3bcfec33e7e56b9cdcd5024a8d70f25d8e.tar.gz kernel-cce01a3bcfec33e7e56b9cdcd5024a8d70f25d8e.tar.xz kernel-cce01a3bcfec33e7e56b9cdcd5024a8d70f25d8e.zip |
Sync up specfile, config generation, and patches
Signed-off-by: Jeremy Cline <jcline@redhat.com>
Diffstat (limited to 'mod-extra-blacklist.sh')
-rwxr-xr-x | mod-extra-blacklist.sh | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/mod-extra-blacklist.sh b/mod-extra-blacklist.sh new file mode 100755 index 000000000..9569ef6f2 --- /dev/null +++ b/mod-extra-blacklist.sh @@ -0,0 +1,48 @@ +#!/bin/bash + +buildroot="$1" +kernel_base="$2" + +blacklist() +{ + cat > "$buildroot/etc/modprobe.d/$1-blacklist.conf" <<-__EOF__ + # This kernel module can be automatically loaded by non-root users. To + # enhance system security, the module is blacklisted by default to ensure + # system administrators make the module available for use as needed. + # See https://access.redhat.com/articles/3760101 for more details. + # + # Remove the blacklist by adding a comment # at the start of the line. + blacklist $1 +__EOF__ +} + +check_blacklist() +{ + if modinfo "$1" | grep -q '^alias:\s\+net-'; then + mod="${1##*/}" + mod="${mod%.ko*}" + echo "$mod has an alias that allows auto-loading. Blacklisting." + blacklist "$mod" + fi +} + +foreachp() +{ + P=$(nproc) + bgcount=0 + while read mod; do + $1 "$mod" & + + bgcount=$((bgcount + 1)) + if [ $bgcount -eq $P ]; then + wait -n + bgcount=$((bgcount - 1)) + fi + done + + wait +} + +[ -d "$buildroot/etc/modprobe.d/" ] || mkdir -p "$buildroot/etc/modprobe.d/" +find "$buildroot/$kernel_base/extra" -name "*.ko*" | \ + foreachp check_blacklist |