]> git.pld-linux.org Git - packages/openssh.git/blobdiff - opensshd.init
- prevent sshd from being killed via oom
[packages/openssh.git] / opensshd.init
index 343203db5e13c66d5c75b1a9977d5ec6cf02ab5b..17c2a2b9274cbc7f9c93c502eacb0ddff4a2381d 100644 (file)
@@ -4,10 +4,11 @@
 #
 # chkconfig:   345 55 45
 #
-# description: sshd (secure shell daemon) is a server part of the ssh suite.
-#              Ssh can be used for remote login, remote file copying, TCP port
+# description: sshd (secure shell daemon) is a server part of the ssh suite. \
+#              Ssh can be used for remote login, remote file copying, TCP port \
 #              forwarding etc. Ssh offers strong encryption and authentication.
 
+SSHD_OOM_ADJUST=-17
 
 # Source function library
 . /etc/rc.d/init.d/functions
 
 # Check that networking is up.
 if is_yes "${NETWORKING}"; then
-       if [ ! -f /var/lock/subsys/network -a != stop -a != status -a != init ]; then
+       if [ ! -f /var/lock/subsys/network -a "$1" != stop -a "$1" != status -a "$1" != init ]; then
                msg_network_down OpenSSH
                exit 1
        fi
 else
        exit 0
 fi
-                       
-RETVAL=0
-# See how we were called.
-case "$1" in
-  start)
+
+adjust_oom() {
+    if [ -e /var/run/sshd.pid ]; then
+       for pid in $(cat /var/run/sshd.pid); do
+               if [ -w "/proc/$pid/oom_adj" ]; then
+                   echo "$SSHD_OOM_ADJUST" > "/proc/$pid/oom_adj" 2> /dev/null || :
+               fi
+       done
+    fi
+}
+
+checkconfig() {
+       /usr/sbin/sshd -t || exit 1
+}
+
+start() {
        # generate new keys with empty passwords if they do not exist
        if [ ! -f /etc/ssh/ssh_host_key -o ! -s /etc/ssh/ssh_host_key ]; then
                /usr/bin/ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key -N '' 1>&2
                chmod 600 /etc/ssh/ssh_host_key
+               [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_key || :
        fi
        if [ ! -f /etc/ssh/ssh_host_rsa_key -o ! -s /etc/ssh/ssh_host_rsa_key ]; then
                /usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N '' 1>&2
                chmod 600 /etc/ssh/ssh_host_rsa_key
+               [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_rsa_key || :
        fi
        if [ ! -f /etc/ssh/ssh_host_dsa_key -o ! -s /etc/ssh/ssh_host_dsa_key ]; then
                /usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N '' 1>&2
                chmod 600 /etc/ssh/ssh_host_dsa_key
+               [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_dsa_key || :
        fi
 
+       checkconfig
+
        if [ ! -f /etc/ssh/ssh_host_key ]; then
                msg_not_running OpenSSH
                nls "No SSH host key found! You must run \"%s init\" first." "$0"
@@ -55,27 +72,41 @@ case "$1" in
        # Check if the service is already running?
        if [ ! -f /var/lock/subsys/sshd ]; then
                msg_starting OpenSSH
-               ULIMIT_C="-S -c 0"
-               daemon /usr/sbin/sshd 
+               daemon --pidfile /var/run/sshd.pid /usr/sbin/sshd
                RETVAL=$?
-               [ $RETVAL -eq 0 ] && touch /var/lock/subsys/sshd                
+               adjust_oom
+               [ $RETVAL -eq 0 ] && touch /var/lock/subsys/sshd
        else
                msg_already_running OpenSSH
        fi
-       ;;
-  stop)
+}
+
+stop() {
        if [ -f /var/lock/subsys/sshd ]; then
                msg_stopping OpenSSH
-               killproc sshd
-               rm -f /var/run/sshd.pid /var/lock/subsys/sshd >/dev/null 2>&1
+               # we use start-stop-daemon to stop sshd, as it is unacceptable for such
+               # critical service as sshd to kill it by procname, but unfortunately
+               # rc-scripts does not provide way to kill *only* by pidfile
+               start-stop-daemon --stop --quiet --pidfile /var/run/sshd.pid && ok || fail
+               rm -f /var/lock/subsys/sshd >/dev/null 2>&1
        else
                msg_not_running OpenSSH
-       fi      
+       fi
+}
+
+RETVAL=0
+# See how we were called.
+case "$1" in
+  start)
+       start
+       ;;
+  stop)
+       stop
        ;;
   restart)
-       $0 stop
-       $0 start
-       exit $?
+       checkconfig
+       stop
+       start
        ;;
   status)
        status sshd
@@ -86,20 +117,24 @@ case "$1" in
        nls "will use password for the key, you will need to type it on each"
        nls "reboot."
        /usr/bin/ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key
+       [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_key || :
        chmod 600 /etc/ssh/ssh_host_key
        /usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key
+       [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_rsa_key || :
        chmod 600 /etc/ssh/ssh_host_rsa_key
        /usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key
        chmod 600 /etc/ssh/ssh_host_dsa_key
+       [ -x /sbin/restorecon ] && /sbin/restorecon /etc/ssh/ssh_host_dsa_key || :
        exit $?
        ;;
   reload|force-reload)
        if [ -f /var/lock/subsys/sshd ]; then
+               checkconfig
                msg_reloading OpenSSH
                killproc sshd -HUP
                RETVAL=$?
        else
-               msg_not_running OpenSSH >&2
+               msg_not_running OpenSSH
                exit 7
        fi
        ;;
This page took 0.048663 seconds and 4 git commands to generate.