From owner-freebsd-bugs@freebsd.org Sun Sep 2 17:44:36 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C89BBFF50A9 for ; Sun, 2 Sep 2018 17:44:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 649958145B for ; Sun, 2 Sep 2018 17:44:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 2055BFF50A8; Sun, 2 Sep 2018 17:44:36 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F2724FF50A6 for ; Sun, 2 Sep 2018 17:44:35 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 837098145A for ; Sun, 2 Sep 2018 17:44:35 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id AFFD615945 for ; Sun, 2 Sep 2018 17:44:34 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w82HiYwL086145 for ; Sun, 2 Sep 2018 17:44:34 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w82HiYJ4086144 for bugs@FreeBSD.org; Sun, 2 Sep 2018 17:44:34 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 231099] getty fails to open /dev/ttyu0 Date: Sun, 02 Sep 2018 17:44:34 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: sbruno@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Sep 2018 17:44:37 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231099 Bug ID: 231099 Summary: getty fails to open /dev/ttyu0 Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: bin Assignee: bugs@FreeBSD.org Reporter: sbruno@FreeBSD.org FreeBSD bgp0.ysv.freebsd.org 12.0-ALPHA3 FreeBSD 12.0-ALPHA3 #0 r338350M: T= ue Aug 28 17:14:21 UTC 2018=20=20=20=20 peter@build-12.freebsd.org:/usr/obj/usr/src/sys/CLUSTER12 amd64 After a reboot, the getty attaching to ttyu0 on a few hosts will attach and present a login for administrative purposes. At some point, and for some unknown reason, getty will exit and init will be unable to restart it. Sep 2 17:41:58 bgp0 init[9998]: getty repeating too quickly on port /dev/ttyu0, sleeping 30 secs Sep 2 17:42:28 bgp0 init[10003]: getty repeating too quickly on port /dev/ttyu0, sleeping 30 secs This happens until a reboot. I'm unsure if this is due to the console being open by things like conserver or not. Sending a HUP to init does not restart the getty. root@bgp0.ysv:/ # ps auwxxx | grep getty root 1207 0.0 0.1 10844 2424 v0 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv0 root 1208 0.0 0.1 10844 2424 v1 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv1 root 1209 0.0 0.1 10844 2424 v2 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv2 root 1210 0.0 0.1 10844 2424 v3 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv3 root 1211 0.0 0.1 10844 2424 v4 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv4 root 1212 0.0 0.1 10844 2424 v5 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv5 root 1213 0.0 0.1 10844 2424 v6 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv6 root 1214 0.0 0.1 10844 2424 v7 Is+ Wed15 0:00.00 /usr/libexec/getty Pc ttyv7 root 10034 0.0 0.1 11252 2732 0 S+ 17:44 0:00.00 grep getty root@bgp0.ysv:/ # cat /etc/ttys=20 # # $FreeBSD: head/etc/etc.amd64/ttys 333436 2018-05-09 20:49:00Z imp $ # @(#)ttys 5.1 (Berkeley) 4/17/89 # # This file specifies various information about terminals on the system. # It is used by several different programs. Common entries for the # various columns include: # # name The name of the terminal device. # # getty The program to start running on the terminal. Typically a # getty program, as the name implies. Other common entries # include none, when no getty is needed, and xdm, to start the # X Window System. # # type The initial terminal type for this port. For hardwired # terminal lines, this will contain the type of terminal used. # For virtual consoles, the correct type is typically xterm. # Other common values include dialup for incoming modem ports, and # unknown when the terminal type cannot be predetermined. # # status Must be on or off. If on, init will run the getty program on # the specified port. If the word "secure" appears, this tty # allows root login. # # name getty type status comments # # If console is marked "insecure", then init will ask for the root password # when going to single-user mode. console none unknown off secure # ttyv0 "/usr/libexec/getty Pc" xterm onifexists secure # Virtual terminals ttyv1 "/usr/libexec/getty Pc" xterm onifexists secure ttyv2 "/usr/libexec/getty Pc" xterm onifexists secure ttyv3 "/usr/libexec/getty Pc" xterm onifexists secure ttyv4 "/usr/libexec/getty Pc" xterm onifexists secure ttyv5 "/usr/libexec/getty Pc" xterm onifexists secure ttyv6 "/usr/libexec/getty Pc" xterm onifexists secure ttyv7 "/usr/libexec/getty Pc" xterm onifexists secure ttyv8 "/usr/local/bin/xdm -nodaemon" xterm off secure # Serial terminals # The 'dialup' keyword identifies dialin lines to login, fingerd etc. ttyu0 "/usr/libexec/getty std.115200" xterm on secure ttyu1 "/usr/libexec/getty std.9600" dialup off secure ttyu2 "/usr/libexec/getty std.9600" dialup off secure ttyu3 "/usr/libexec/getty std.9600" dialup off secure # Dumb console dcons "/usr/libexec/getty std.9600" vt100 off secure --=20 You are receiving this mail because: You are the assignee for the bug.=