xref: /freebsd/sbin/init/init.8 (revision c2965cd1854b75e6a13cb4bd6759b71adc8d2a87)
1.\" Copyright (c) 1980, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" Donn Seeley at Berkeley Software Design, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions
9.\" are met:
10.\" 1. Redistributions of source code must retain the above copyright
11.\"    notice, this list of conditions and the following disclaimer.
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\"    notice, this list of conditions and the following disclaimer in the
14.\"    documentation and/or other materials provided with the distribution.
15.\" 4. Neither the name of the University nor the names of its contributors
16.\"    may be used to endorse or promote products derived from this software
17.\"    without specific prior written permission.
18.\"
19.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29.\" SUCH DAMAGE.
30.\"
31.\"     @(#)init.8	8.3 (Berkeley) 4/18/94
32.\" $FreeBSD$
33.\"
34.Dd March 14, 2012
35.Dt INIT 8
36.Os
37.Sh NAME
38.Nm init
39.Nd process control initialization
40.Sh SYNOPSIS
41.Nm
42.Nm
43.Oo
44.Cm 0 | 1 | 6 |
45.Cm c | q
46.Oc
47.Sh DESCRIPTION
48The
49.Nm
50utility
51is the last stage of the boot process.
52It normally runs the automatic reboot sequence as described in
53.Xr rc 8 ,
54and if this succeeds, begins multi-user operation.
55If the reboot scripts fail,
56.Nm
57commences single-user operation by giving
58the super-user a shell on the console.
59The
60.Nm
61utility may be passed parameters
62from the boot program to
63prevent the system from going multi-user and to instead execute
64a single-user shell without starting the normal daemons.
65The system is then quiescent for maintenance work and may
66later be made to go to multi-user by exiting the
67single-user shell (with ^D).
68This
69causes
70.Nm
71to run the
72.Pa /etc/rc
73start up command file in fastboot mode (skipping disk checks).
74.Pp
75If the
76.Em console
77entry in the
78.Xr ttys 5
79file is marked
80.Dq insecure ,
81then
82.Nm
83will require that the super-user password be
84entered before the system will start a single-user shell.
85The password check is skipped if the
86.Em console
87is marked as
88.Dq secure .
89.Pp
90If the system security level (see
91.Xr security 7 )
92is initially nonzero, then
93.Nm
94leaves it unchanged.
95Otherwise,
96.Nm
97raises the level to 1 before going multi-user for the first time.
98Since the level cannot be reduced, it will be at least 1 for
99subsequent operation, even on return to single-user.
100If a level higher than 1 is desired while running multi-user,
101it can be set before going multi-user, e.g., by the startup script
102.Xr rc 8 ,
103using
104.Xr sysctl 8
105to set the
106.Va kern.securelevel
107variable to the required security level.
108.Pp
109If
110.Nm
111is run in a jail, the security level of the
112.Dq host system
113will not be affected.
114Part of the information set up in the kernel to support a jail
115is a per-jail security level.
116This allows running a higher security level inside of a jail
117than that of the host system.
118See
119.Xr jail 8
120for more information about jails.
121.Pp
122In multi-user operation,
123.Nm
124maintains
125processes for the terminal ports found in the file
126.Xr ttys 5 .
127The
128.Nm
129utility reads this file and executes the command found in the second field,
130unless the first field refers to a device in
131.Pa /dev
132which is not configured.
133The first field is supplied as the final argument to the command.
134This command is usually
135.Xr getty 8 ;
136.Nm getty
137opens and initializes the tty line
138and
139executes the
140.Xr login 1
141program.
142The
143.Nm login
144program, when a valid user logs in,
145executes a shell for that user.
146When this shell
147dies, either because the user logged out
148or an abnormal termination occurred (a signal),
149the cycle is restarted by
150executing a new
151.Nm getty
152for the line.
153.Pp
154The
155.Nm
156utility can also be used to keep arbitrary daemons running,
157automatically restarting them if they die.
158In this case, the first field in the
159.Xr ttys 5
160file must not reference the path to a configured device node
161and will be passed to the daemon
162as the final argument on its command line.
163This is similar to the facility offered in the
164.At V
165.Pa /etc/inittab .
166.Pp
167Line status (on, off, secure, getty, or window information)
168may be changed in the
169.Xr ttys 5
170file without a reboot by sending the signal
171.Dv SIGHUP
172to
173.Nm
174with the command
175.Dq Li "kill -HUP 1" .
176On receipt of this signal,
177.Nm
178re-reads the
179.Xr ttys 5
180file.
181When a line is turned off in
182.Xr ttys 5 ,
183.Nm
184will send a SIGHUP signal to the controlling process
185for the session associated with the line.
186For any lines that were previously turned off in the
187.Xr ttys 5
188file and are now on,
189.Nm
190executes the command specified in the second field.
191If the command or window field for a line is changed,
192the change takes effect at the end of the current
193login session (e.g., the next time
194.Nm
195starts a process on the line).
196If a line is commented out or deleted from
197.Xr ttys 5 ,
198.Nm
199will not do anything at all to that line.
200.Pp
201The
202.Nm
203utility will terminate multi-user operations and resume single-user mode
204if sent a terminate
205.Pq Dv TERM
206signal, for example,
207.Dq Li "kill \-TERM 1" .
208If there are processes outstanding that are deadlocked (because of
209hardware or software failure),
210.Nm
211will not wait for them all to die (which might take forever), but
212will time out after 30 seconds and print a warning message.
213.Pp
214The
215.Nm
216utility will cease creating new processes
217and allow the system to slowly die away, if it is sent a terminal stop
218.Pq Dv TSTP
219signal, i.e.\&
220.Dq Li "kill \-TSTP 1" .
221A later hangup will resume full
222multi-user operations, or a terminate will start a single-user shell.
223This hook is used by
224.Xr reboot 8
225and
226.Xr halt 8 .
227.Pp
228The
229.Nm
230utility will terminate all possible processes (again, it will not wait
231for deadlocked processes) and reboot the machine if sent the interrupt
232.Pq Dv INT
233signal, i.e.\&
234.Dq Li "kill \-INT 1".
235This is useful for shutting the machine down cleanly from inside the kernel
236or from X when the machine appears to be hung.
237.Pp
238The
239.Nm
240utility will do the same, except it will halt the machine if sent
241the user defined signal 1
242.Pq Dv USR1 ,
243or will halt and turn the power off (if hardware permits) if sent
244the user defined signal 2
245.Pq Dv USR2 .
246.Pp
247When shutting down the machine,
248.Nm
249will try to run the
250.Pa /etc/rc.shutdown
251script.
252This script can be used to cleanly terminate specific programs such
253as
254.Nm innd
255(the InterNetNews server).
256If this script does not terminate within 120 seconds,
257.Nm
258will terminate it.
259The timeout can be configured via the
260.Xr sysctl 8
261variable
262.Va kern.init_shutdown_timeout .
263.Pp
264The role of
265.Nm
266is so critical that if it dies, the system will reboot itself
267automatically.
268If, at bootstrap time, the
269.Nm
270process cannot be located, the system will panic with the message
271.Dq "panic: init died (signal %d, exit %d)" .
272.Pp
273If run as a user process as shown in the second synopsis line,
274.Nm
275will emulate
276.At V
277behavior, i.e., super-user can specify the desired
278.Em run-level
279on a command line, and
280.Nm
281will signal the original
282(PID 1)
283.Nm
284as follows:
285.Bl -column Run-level SIGTERM
286.It Sy "Run-level	Signal	Action"
287.It Cm 0 Ta Dv SIGUSR2 Ta "Halt and turn the power off"
288.It Cm 1 Ta Dv SIGTERM Ta "Go to single-user mode"
289.It Cm 6 Ta Dv SIGINT Ta "Reboot the machine"
290.It Cm c Ta Dv SIGTSTP Ta "Block further logins"
291.It Cm q Ta Dv SIGHUP Ta Rescan the
292.Xr ttys 5
293file
294.El
295.Sh FILES
296.Bl -tag -width /var/log/init.log -compact
297.It Pa /dev/console
298system console device
299.It Pa /dev/tty*
300terminal ports found in
301.Xr ttys 5
302.It Pa /etc/ttys
303the terminal initialization information file
304.It Pa /etc/rc
305system startup commands
306.It Pa /etc/rc.shutdown
307system shutdown commands
308.It Pa /var/log/init.log
309log of
310.Xr rc 8
311output if the system console device is not available
312.El
313.Sh DIAGNOSTICS
314.Bl -diag
315.It "getty repeating too quickly on port %s, sleeping."
316A process being started to service a line is exiting quickly
317each time it is started.
318This is often caused by a ringing or noisy terminal line.
319.Bf -emphasis
320Init will sleep for 30 seconds,
321then continue trying to start the process.
322.Ef
323.It "some processes would not die; ps axl advised."
324A process
325is hung and could not be killed when the system was shutting down.
326This condition is usually caused by a process
327that is stuck in a device driver because of
328a persistent device error condition.
329.El
330.Sh SEE ALSO
331.Xr kill 1 ,
332.Xr login 1 ,
333.Xr sh 1 ,
334.Xr ttys 5 ,
335.Xr security 7 ,
336.Xr getty 8 ,
337.Xr halt 8 ,
338.Xr jail 8 ,
339.Xr rc 8 ,
340.Xr reboot 8 ,
341.Xr shutdown 8 ,
342.Xr sysctl 8
343.Sh HISTORY
344An
345.Nm
346utility appeared in
347.At v6 .
348.Sh CAVEATS
349Systems without
350.Xr sysctl 8
351behave as though they have security level \-1.
352.Pp
353Setting the security level above 1 too early in the boot sequence can
354prevent
355.Xr fsck 8
356from repairing inconsistent file systems.
357The
358preferred location to set the security level is at the end of
359.Pa /etc/rc
360after all multi-user startup actions are complete.
361