1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Donn Seeley at Berkeley Software Design, Inc. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions 9.\" are met: 10.\" 1. Redistributions of source code must retain the above copyright 11.\" notice, this list of conditions and the following disclaimer. 12.\" 2. Redistributions in binary form must reproduce the above copyright 13.\" notice, this list of conditions and the following disclaimer in the 14.\" documentation and/or other materials provided with the distribution. 15.\" 4. Neither the name of the University nor the names of its contributors 16.\" may be used to endorse or promote products derived from this software 17.\" without specific prior written permission. 18.\" 19.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29.\" SUCH DAMAGE. 30.\" 31.\" @(#)init.8 8.3 (Berkeley) 4/18/94 32.\" $FreeBSD$ 33.\" 34.Dd March 14, 2012 35.Dt INIT 8 36.Os 37.Sh NAME 38.Nm init 39.Nd process control initialization 40.Sh SYNOPSIS 41.Nm 42.Nm 43.Oo 44.Cm 0 | 1 | 6 | 45.Cm c | q 46.Oc 47.Sh DESCRIPTION 48The 49.Nm 50utility 51is the last stage of the boot process. 52It normally runs the automatic reboot sequence as described in 53.Xr rc 8 , 54and if this succeeds, begins multi-user operation. 55If the reboot scripts fail, 56.Nm 57commences single-user operation by giving 58the super-user a shell on the console. 59The 60.Nm 61utility may be passed parameters 62from the boot program to 63prevent the system from going multi-user and to instead execute 64a single-user shell without starting the normal daemons. 65The system is then quiescent for maintenance work and may 66later be made to go to multi-user by exiting the 67single-user shell (with ^D). 68This 69causes 70.Nm 71to run the 72.Pa /etc/rc 73start up command file in fastboot mode (skipping disk checks). 74.Pp 75If the 76.Em console 77entry in the 78.Xr ttys 5 79file is marked 80.Dq insecure , 81then 82.Nm 83will require that the super-user password be 84entered before the system will start a single-user shell. 85The password check is skipped if the 86.Em console 87is marked as 88.Dq secure . 89.Pp 90If the system security level (see 91.Xr security 7 ) 92is initially nonzero, then 93.Nm 94leaves it unchanged. 95Otherwise, 96.Nm 97raises the level to 1 before going multi-user for the first time. 98Since the level cannot be reduced, it will be at least 1 for 99subsequent operation, even on return to single-user. 100If a level higher than 1 is desired while running multi-user, 101it can be set before going multi-user, e.g., by the startup script 102.Xr rc 8 , 103using 104.Xr sysctl 8 105to set the 106.Va kern.securelevel 107variable to the required security level. 108.Pp 109If 110.Nm 111is run in a jail, the security level of the 112.Dq host system 113will not be affected. 114Part of the information set up in the kernel to support a jail 115is a per-jail security level. 116This allows running a higher security level inside of a jail 117than that of the host system. 118See 119.Xr jail 8 120for more information about jails. 121.Pp 122In multi-user operation, 123.Nm 124maintains 125processes for the terminal ports found in the file 126.Xr ttys 5 . 127The 128.Nm 129utility reads this file and executes the command found in the second field, 130unless the first field refers to a device in 131.Pa /dev 132which is not configured. 133The first field is supplied as the final argument to the command. 134This command is usually 135.Xr getty 8 ; 136.Nm getty 137opens and initializes the tty line 138and 139executes the 140.Xr login 1 141program. 142The 143.Nm login 144program, when a valid user logs in, 145executes a shell for that user. 146When this shell 147dies, either because the user logged out 148or an abnormal termination occurred (a signal), 149the cycle is restarted by 150executing a new 151.Nm getty 152for the line. 153.Pp 154The 155.Nm 156utility can also be used to keep arbitrary daemons running, 157automatically restarting them if they die. 158In this case, the first field in the 159.Xr ttys 5 160file must not reference the path to a configured device node 161and will be passed to the daemon 162as the final argument on its command line. 163This is similar to the facility offered in the 164.At V 165.Pa /etc/inittab . 166.Pp 167Line status (on, off, secure, getty, or window information) 168may be changed in the 169.Xr ttys 5 170file without a reboot by sending the signal 171.Dv SIGHUP 172to 173.Nm 174with the command 175.Dq Li "kill -HUP 1" . 176On receipt of this signal, 177.Nm 178re-reads the 179.Xr ttys 5 180file. 181When a line is turned off in 182.Xr ttys 5 , 183.Nm 184will send a SIGHUP signal to the controlling process 185for the session associated with the line. 186For any lines that were previously turned off in the 187.Xr ttys 5 188file and are now on, 189.Nm 190executes the command specified in the second field. 191If the command or window field for a line is changed, 192the change takes effect at the end of the current 193login session (e.g., the next time 194.Nm 195starts a process on the line). 196If a line is commented out or deleted from 197.Xr ttys 5 , 198.Nm 199will not do anything at all to that line. 200.Pp 201The 202.Nm 203utility will terminate multi-user operations and resume single-user mode 204if sent a terminate 205.Pq Dv TERM 206signal, for example, 207.Dq Li "kill \-TERM 1" . 208If there are processes outstanding that are deadlocked (because of 209hardware or software failure), 210.Nm 211will not wait for them all to die (which might take forever), but 212will time out after 30 seconds and print a warning message. 213.Pp 214The 215.Nm 216utility will cease creating new processes 217and allow the system to slowly die away, if it is sent a terminal stop 218.Pq Dv TSTP 219signal, i.e.\& 220.Dq Li "kill \-TSTP 1" . 221A later hangup will resume full 222multi-user operations, or a terminate will start a single-user shell. 223This hook is used by 224.Xr reboot 8 225and 226.Xr halt 8 . 227.Pp 228The 229.Nm 230utility will terminate all possible processes (again, it will not wait 231for deadlocked processes) and reboot the machine if sent the interrupt 232.Pq Dv INT 233signal, i.e.\& 234.Dq Li "kill \-INT 1". 235This is useful for shutting the machine down cleanly from inside the kernel 236or from X when the machine appears to be hung. 237.Pp 238The 239.Nm 240utility will do the same, except it will halt the machine if sent 241the user defined signal 1 242.Pq Dv USR1 , 243or will halt and turn the power off (if hardware permits) if sent 244the user defined signal 2 245.Pq Dv USR2 . 246.Pp 247When shutting down the machine, 248.Nm 249will try to run the 250.Pa /etc/rc.shutdown 251script. 252This script can be used to cleanly terminate specific programs such 253as 254.Nm innd 255(the InterNetNews server). 256If this script does not terminate within 120 seconds, 257.Nm 258will terminate it. 259The timeout can be configured via the 260.Xr sysctl 8 261variable 262.Va kern.init_shutdown_timeout . 263.Pp 264The role of 265.Nm 266is so critical that if it dies, the system will reboot itself 267automatically. 268If, at bootstrap time, the 269.Nm 270process cannot be located, the system will panic with the message 271.Dq "panic: init died (signal %d, exit %d)" . 272.Pp 273If run as a user process as shown in the second synopsis line, 274.Nm 275will emulate 276.At V 277behavior, i.e., super-user can specify the desired 278.Em run-level 279on a command line, and 280.Nm 281will signal the original 282(PID 1) 283.Nm 284as follows: 285.Bl -column Run-level SIGTERM 286.It Sy "Run-level Signal Action 287.It Cm 0 Ta Dv SIGUSR2 Ta "Halt and turn the power off" 288.It Cm 1 Ta Dv SIGTERM Ta "Go to single-user mode" 289.It Cm 6 Ta Dv SIGINT Ta "Reboot the machine" 290.It Cm c Ta Dv SIGTSTP Ta "Block further logins" 291.It Cm q Ta Dv SIGHUP Ta Rescan the 292.Xr ttys 5 293file 294.El 295.Sh FILES 296.Bl -tag -width /var/log/init.log -compact 297.It Pa /dev/console 298system console device 299.It Pa /dev/tty* 300terminal ports found in 301.Xr ttys 5 302.It Pa /etc/ttys 303the terminal initialization information file 304.It Pa /etc/rc 305system startup commands 306.It Pa /etc/rc.shutdown 307system shutdown commands 308.It Pa /var/log/init.log 309log of 310.Xr rc 8 311output if the system console device is not available 312.El 313.Sh DIAGNOSTICS 314.Bl -diag 315.It "getty repeating too quickly on port %s, sleeping." 316A process being started to service a line is exiting quickly 317each time it is started. 318This is often caused by a ringing or noisy terminal line. 319.Bf -emphasis 320Init will sleep for 30 seconds, 321then continue trying to start the process. 322.Ef 323.It "some processes would not die; ps axl advised." 324A process 325is hung and could not be killed when the system was shutting down. 326This condition is usually caused by a process 327that is stuck in a device driver because of 328a persistent device error condition. 329.El 330.Sh SEE ALSO 331.Xr kill 1 , 332.Xr login 1 , 333.Xr sh 1 , 334.Xr ttys 5 , 335.Xr security 7 , 336.Xr getty 8 , 337.Xr halt 8 , 338.Xr jail 8 , 339.Xr rc 8 , 340.Xr reboot 8 , 341.Xr shutdown 8 , 342.Xr sysctl 8 343.Sh HISTORY 344An 345.Nm 346utility appeared in 347.At v6 . 348.Sh CAVEATS 349Systems without 350.Xr sysctl 8 351behave as though they have security level \-1. 352.Pp 353Setting the security level above 1 too early in the boot sequence can 354prevent 355.Xr fsck 8 356from repairing inconsistent file systems. 357The 358preferred location to set the security level is at the end of 359.Pa /etc/rc 360after all multi-user startup actions are complete. 361