* #10198: ExecShield wrapperi za grub, grub-probe
[kernel-cn.git] / debian / postinst
index deb7984..291078f 100755 (executable)
@@ -134,21 +134,24 @@ fi
 echo -n " grub2"
 
 # workaround grsec
-if [ -x /sbin/chpax ]; then
-    if [ -x /usr/sbin/grub ]; then
-        chpax -spmrx /usr/sbin/grub || true
+if uname -a | grep -q grsec; then
+    if [ -x /sbin/chpax ]; then
+        # grub
+        if [ -x /usr/sbin/grub.real ]; then
+            chpax -spmrx /usr/sbin/grub.real >/dev/null 2>&1 || true
+        elif [ -x /usr/sbin/grub ]; then
+            chpax -spmrx /usr/sbin/grub >/dev/null 2>&1 || true
+        fi
+
+        # grub-probe
+        if [ -x /usr/sbin/grub-probe.real ]; then
+            chpax -spmrx /usr/sbin/grub-probe.real >/dev/null 2>&1 || true
+        elif [ -x /usr/sbin/grub-probe ]; then
+            chpax -spmrx /usr/sbin/grub-probe >/dev/null 2>&1 || true
+        fi
+
+        echo -n " grsec"
     fi
-    if [ -x /usr/sbin/grub-probe ]; then
-        chpax -spmrx /usr/sbin/grub-probe || true
-    fi
-fi
-echo -n " grub3"
-
-# workaround execshield
-SHIELD=$(sysctl -e -n kernel.exec-shield)
-if [ ! -z "$SHIELD" ]; then
-    sysctl -e -w kernel.exec-shield=0 >/dev/null 2>&1
-    echo -n " execshield1"
 fi
 
 # remove obsolete devfs/compat links and restore normal udev behaviour
@@ -165,7 +168,7 @@ echo -n " udev"
 if [ -f "$device_map" ]; then
     mv -f "$device_map" "$device_map.old"
 fi
-grub --batch --no-floppy --device-map="$device_map" <<EOF >/dev/null 2>&1
+grub --batch --no-floppy --device-map="$device_map" <<'EOF' >/dev/null 2>&1
 quit
 EOF
 if [ ! -s "$device_map" ]; then
@@ -173,10 +176,10 @@ if [ ! -s "$device_map" ]; then
         mv -f "$device_map.old" "$device_map"
     fi
 
-:q!else
+else
     rm -f "$device_map.old"
 fi
-echo -n " grub4"
+echo -n " grub3"
 
 # import GRUB helper functions (again, updated device map)
 . /usr/share/kernel-2.6-cn/grub-functions.sh
@@ -205,7 +208,7 @@ if [ -h "$install_device" ]; then
             || true
     fi
 fi
-echo -n " grub5"
+echo -n " grub4"
 
 # install GRUB loader
 if ! grub-install --no-floppy "$install_device" >/dev/null 2>&1; then
@@ -214,7 +217,7 @@ if ! grub-install --no-floppy "$install_device" >/dev/null 2>&1; then
     echo "CN: Do not reboot your server and report this to OTRS immediately!"
     exit 1
 fi
-echo -n " grub6"
+echo -n " grub5"
 
 # fix possible wrong params in menu.lst
 cp_check_and_sed '^# groot=' \
@@ -224,7 +227,7 @@ cp_check_and_sed '^# kopt=' \
   "s;^# kopt=\(.*\)root=[^[:space:]]*\(.*\);# kopt=\1root=$root_device\2;g" \
       "$menu_file" || true
 /usr/sbin/update-grub >/dev/null 2>&1 || true
-echo -n " grub7"
+echo -n " grub6"
 
 # and final stage of devfs/udev brokeness fix
 if [ "x$install_device_resolved" != "x$install_device" ]; then
@@ -249,13 +252,7 @@ if [ "x$install_device_resolved" != "x$install_device" ]; then
       "s;\(^kernel.*\)root=[^[:space:]]*\(.*\);\1root=$root_device\2;g" \
           "$menu_file" || true
 fi
-echo -n " grub8"
-
-# restore execshield state
-if [ ! -z "$SHIELD" ]; then
-    sysctl -e -w "kernel.exec-shield=$SHIELD" >/dev/null 2>&1
-    echo -n " execshield2"
-fi
+echo -n " grub7"
 
 # disable lilo
 if [ -e /etc/lilo.conf ]; then
@@ -313,9 +310,9 @@ fi
 
 # default kernel parameters
 rm -f /etc/sysctl.conf.$$
-cat > /etc/sysctl.conf.$$ <<EOF
-kernel.exec-shield=3
+cat > /etc/sysctl.conf.$$ <<'EOF'
 kernel.maps_protect=1
+kernel.exec-shield=0
 net.core.rmem_default=1048576
 net.core.wmem_default=1048576
 net.ipv4.conf.all.accept_redirects=0
@@ -328,24 +325,23 @@ net.ipv4.icmp_echo_ignore_broadcasts=1
 net.ipv4.icmp_ignore_bogus_error_responses=1
 net.ipv4.ip_forward=0
 net.ipv4.ip_local_port_range=10000 65000
-net.ipv4.tcp_congestion_control=cubic
 net.ipv4.tcp_ecn=0
-net.ipv4.tcp_max_syn_backlog=8192
+net.ipv4.tcp_max_syn_backlog=1024
 net.ipv4.tcp_retries1=2
 net.ipv4.tcp_rfc1337=1
 net.ipv4.tcp_syncookies=1
 vm.mmap_min_addr=65536
 EOF
 
-# old kernel params
+# old kernel params (skipping some of the obsolete or overrided entries)
 if [ -e /etc/sysctl.conf ]; then
-    egrep -v 'net\.core\.(r|w)mem_max|net\.ipv4\.tcp_(r|w)mem|vm\.bdflush|net\.ipv4\.ip_local_port_range|kernel\.rtsig-max|net\.ipv4\.tcp_syncookies' \
+    egrep -v 'net\.core\.(r|w)mem_max|net\.ipv4\.tcp_(r|w)mem|vm\.bdflush|net\.ipv4\.ip_local_port_range|kernel\.rtsig-max|net\.ipv4\.tcp_syncookies|kernel\.exec-shield|net\.ipv4\.tcp_max_syn_backlog|net\.ipv4\.tcp_congestion_control|kernel\.exec-shield' \
         /etc/sysctl.conf >> /etc/sysctl.conf.$$
 fi
 
 # add sysctl.conf Debian headers
 rm -f /etc/sysctl.conf-head
-cat > /etc/sysctl.conf-head <<EOF
+cat > /etc/sysctl.conf-head <<'EOF'
 #
 # /etc/sysctl.conf - Configuration file for setting system variables
 # See sysctl.conf (5) for information.
@@ -392,7 +388,7 @@ echo -n "CN: Setting up PAM configurations:"
 if [ -e /etc/security/limits.conf ]; then
     rm -f /etc/security/limits.conf.$$
     cp /etc/security/limits.conf /etc/security/limits.conf.$$
-    cp-update kernel-2.6-cn /etc/security/limits.conf.$$ <<EOF
+    cp-update kernel-2.6-cn /etc/security/limits.conf.$$ <<'EOF'
 *               soft    core            0
 *              hard    nofile          4096
 *              soft    nofile          4096
@@ -425,7 +421,7 @@ echo "."
 # fix old kernel-2.4-cn postrm
 if [ -e /var/lib/dpkg/info/kernel-2.4-cn.postrm ]; then
     echo "CN: Fixed old kernel-2.4-cn postrm."
-    cat > /var/lib/dpkg/info/kernel-2.4-cn.postrm.$$ <<EOF
+    cat > /var/lib/dpkg/info/kernel-2.4-cn.postrm.$$ <<'EOF'
 #!/bin/sh
 
 set -e
@@ -458,7 +454,7 @@ fi
 # fix old kernel-cn postrm
 if [ -e /var/lib/dpkg/info/kernel-cn.postrm ]; then
     echo "CN: Fixed old kernel-cn postrm."
-    cat > /var/lib/dpkg/info/kernel-cn.postrm.$$ <<EOF
+    cat > /var/lib/dpkg/info/kernel-cn.postrm.$$ <<'EOF'
 #!/bin/sh
 
 set -e