aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorMichael K. Johnson <johnsonm@redhat.com>1999-09-13 16:30:27 +0000
committerMichael K. Johnson <johnsonm@redhat.com>1999-09-13 16:30:27 +0000
commit3bd6f37f736c6d2d52284eba225a5ec1da357557 (patch)
tree36ab642297f0365fed2dce9fc6b9e46189ab97ab /src
parent0902be7aec7f0f871a3c40a9e4f1c1bb407d0932 (diff)
downloadinitscripts-3bd6f37f736c6d2d52284eba225a5ec1da357557.tar
initscripts-3bd6f37f736c6d2d52284eba225a5ec1da357557.tar.gz
initscripts-3bd6f37f736c6d2d52284eba225a5ec1da357557.tar.bz2
initscripts-3bd6f37f736c6d2d52284eba225a5ec1da357557.tar.xz
initscripts-3bd6f37f736c6d2d52284eba225a5ec1da357557.zip
tried to add backgrounding at boot time
Diffstat (limited to 'src')
-rw-r--r--src/ppp-watch.c22
1 files changed, 21 insertions, 1 deletions
diff --git a/src/ppp-watch.c b/src/ppp-watch.c
index b3a7bb53..5a0e7054 100644
--- a/src/ppp-watch.c
+++ b/src/ppp-watch.c
@@ -82,6 +82,7 @@ static int theSigint = 0;
static int theSighup = 0;
static int theSigio = 0;
static int theSigchld = 0;
+static int theSigalrm = 0;
@@ -119,8 +120,16 @@ detach(int now, int parentExitCode, char *device) {
default: exit (27); /* this will catch EIO in particular */
}
}
- if (exitCode)
+ switch (exitCode) {
+ case 0:
+ break;
+ case 34:
+ fprintf(stderr, "Failed to activate %s, retrying in the background\n", device);
+ break;
+ default:
fprintf(stderr, "Failed to activate %s\n", device);
+ break;
+ }
exit(exitCode);
} else {
@@ -244,6 +253,8 @@ signal_handler (int signum) {
theSigio = 1; break;
case SIGCHLD:
theSigchld = 1; break;
+ case SIGALRM:
+ theSigalrm = 1; break;
}
}
@@ -378,6 +389,10 @@ main(int argc, char **argv) {
signal(SIGHUP, signal_handler);
signal(SIGIO, signal_handler);
signal(SIGCHLD, signal_handler);
+ if (theBoot) {
+ signal(SIGALRM, signal_handler);
+ alarm(30);
+ }
fork_exec(1, "/sbin/netreport", NULL, NULL, NULL);
theSigchld = 0;
@@ -391,6 +406,7 @@ main(int argc, char **argv) {
sigaddset(&sigs, SIGHUP);
sigaddset(&sigs, SIGIO);
sigaddset(&sigs, SIGCHLD);
+ if (theBoot) sigaddset(&sigs, SIGALRM);
sigprocmask(SIG_BLOCK, &sigs, NULL);
/* prepare for sigsuspend later */
@@ -400,6 +416,7 @@ main(int argc, char **argv) {
sigdelset(&sigs, SIGHUP);
sigdelset(&sigs, SIGIO);
sigdelset(&sigs, SIGCHLD);
+ if (theBoot) sigdelset(&sigs, SIGALRM);
ifcfg = shvarfilesGet(device);
@@ -488,5 +505,8 @@ main(int argc, char **argv) {
cleanExit(WEXITSTATUS(status));
}
}
+ if (theSigalrm) {
+ detach(1, 34, NULL);
+ }
}
}
l opt">/etc/securetty quiet AddRules "vc/3" /etc/securetty quiet AddRules "vc/4" /etc/securetty quiet AddRules "vc/5" /etc/securetty quiet AddRules "vc/6" /etc/securetty # Security check echo "Updating file check variable : " echo -e "\t- Check security : yes." AddRules "CHECK_SECURITY=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check important permissions : yes." AddRules "CHECK_PERMS=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check suid root file : yes." AddRules "CHECK_SUID_ROOT=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check suid root file integrity (backdoor check) : yes." AddRules "CHECK_SUID_MD5=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check suid group file : yes." AddRules "CHECK_SUID_GROUP=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check world writable file : yes." AddRules "CHECK_WRITEABLE=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check unowned file : yes." AddRules "CHECK_UNOWNED=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check promiscuous mode : yes." AddRules "CHECK_PROMISC=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check listening port : yes." AddRules "CHECK_OPEN_PORT=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check passwd file integrity : yes." AddRules "CHECK_PASSWD=yes" /etc/security/msec/security.conf quiet echo -e "\t- Check shadow file integrity : yes." AddRules "CHECK_SHADOW=yes" /etc/security/msec/security.conf quiet echo -e "\t- Security warning on tty : yes." AddRules "TTY_WARN=yes" /etc/security/msec/security.conf quiet echo -e "\t- Security warning by mail : yes." AddRules "MAIL_WARN=yes" /etc/security/msec/security.conf quiet AddRules "MAIL_USER=root" /etc/security/msec/security.conf quiet echo -e "\t- Security warning in syslog : yes." AddRules "SYSLOG_WARN=yes" /etc/security/msec/security.conf # end security check # Check every 1 minutes for promisc problem echo "Adding promisc check in crontab (scheduled every minutes) :" AddRules "*/1 * * * * root /usr/share/msec/promisc_check.sh" /etc/crontab echo "Adding \"diff\" & \"global\" security check in crontab (scheduled every midnight) :" AddRules "0 4 * * * root /usr/share/msec/security.sh" /etc/crontab # Server update echo "Setting secure level variable to snf :" AddRules "SECURE_LEVEL=snf" /etc/sysconfig/msec # Console timeout echo "Setting console timeout :" AddRules "TMOUT=180" /etc/sysconfig/msec # No history file echo "No history file :" AddRules "HISTFILESIZE=0" /etc/sysconfig/msec # Ip spoofing protection echo "IP spoofing protection :" AddRules "nospoof on" /etc/host.conf AddRules "spoofalert on" /etc/host.conf # icmp echo echo "Ignoring icmp echo :" AddRules "net.ipv4.icmp_echo_ignore_all=1" /etc/sysctl.conf AddRules "net.ipv4.icmp_echo_ignore_broadcasts=1" /etc/sysctl.conf # bad error echo "Enabling bad error message Protection :" AddRules "net.ipv4.icmp_ignore_bogus_error_responses=1" /etc/sysctl.conf # log strange packets echo "Enabling logging Spoofed Packets, Source Routed Packets, Redirect Packets :" AddRules "net.ipv4.conf.all.log_martians=1" /etc/sysctl.conf LoadSysctl # issues echo "Removing /etc/issue.net :" RemoveIssueNet export SECURE_LEVEL=snf IFS=" " echo -n "Disabling all service, except : {" for service in `chkconfig --list | awk '{print $1}'`; do if grep -qx ${service} /etc/security/msec/server.snf; then echo -n " ${service}" fi done echo " } : " for service in `chkconfig --list | awk '{print $1}'`; do chkconfig --del "${service}" if ! chkconfig --msec --add "${service}"; then echo -e "\t- Services ${service} scheduled to be disabled at next boot." fi done echo -e "done.\n"; echo "Setting umask to 022 (u=rw,g=rx) for root, 077 (u=rw) for user :" AddRules "UMASK_ROOT=022" /etc/sysconfig/msec AddRules "UMASK_USER=077" /etc/sysconfig/msec if [[ -f /lib/libsafe.so.2 ]]; then echo "Enabling stack overflow protection :" AddRules "/lib/libsafe.so.2" /etc/ld.so.preload fi # Do not boot on a shell ForbidReboot ForbidAutologin # Group were modified in lib.sh... grpconv ForbidUserList RootSshLogin snf