forked from rpms/kernel
59 lines
1.4 KiB
Bash
Executable File
59 lines
1.4 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
list="$1"
|
|
buildroot=${list%/*}
|
|
|
|
blacklist()
|
|
{
|
|
cat > "$buildroot/etc/modprobe.d/$1-blacklist.conf" <<-__EOF__
|
|
# This kernel module can be automatically loaded by non-root users. To
|
|
# enhance system security, the module is blacklisted by default to ensure
|
|
# system administrators make the module available for use as needed.
|
|
# See https://access.redhat.com/articles/3760101 for more details.
|
|
#
|
|
# Remove the blacklist by adding a comment # at the start of the line.
|
|
blacklist $1
|
|
__EOF__
|
|
}
|
|
|
|
check_blacklist()
|
|
{
|
|
if modinfo "$buildroot/$1" | grep -q '^alias:\s\+net-'; then
|
|
mod="${1##*/}"
|
|
mod="${mod%.ko*}"
|
|
echo "$mod has an alias that allows auto-loading. Blacklisting."
|
|
blacklist "$mod"
|
|
fi
|
|
}
|
|
|
|
foreachp()
|
|
{
|
|
P=$(nproc)
|
|
bgcount=0
|
|
while read mod; do
|
|
$1 "$mod" &
|
|
|
|
bgcount=$((bgcount + 1))
|
|
if [ $bgcount -eq $P ]; then
|
|
wait -n
|
|
bgcount=$((bgcount - 1))
|
|
fi
|
|
done
|
|
|
|
wait
|
|
}
|
|
|
|
[ -d "$buildroot/etc/modprobe.d/" ] || mkdir -p "$buildroot/etc/modprobe.d/"
|
|
|
|
if [ -s $list ]; then
|
|
cat $list | foreachp check_blacklist
|
|
if ls $buildroot/etc/modprobe.d/* >& /dev/null ; then
|
|
echo "%defattr(-,root,root)" >> $list
|
|
echo "%config(noreplace) /etc/modprobe.d/*-blacklist.conf" >> $list
|
|
fi
|
|
else
|
|
# If modules-extra.list is empty the %files section will throw an
|
|
# error. Add a dummy entry to workaround the problem.
|
|
echo "%defattr(-,root,root)" >> $list
|
|
fi
|