1 .\" $NetBSD: getty.8,v 1.16 2002/09/29 14:05:53 wiz Exp $
3 .\" Copyright (c) 1980, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" from: @(#)getty.8 8.1 (Berkeley) 6/4/93
38 .Nd set terminal modes for system access
56 to open and initialize the tty line, read a login name, and invoke
58 The devices on which to run
60 are normally determined by
65 program can also recognize a Point to Point Protocol
67 negotiation, and, if the
71 is set, invoke the program given by that string, e.g.,
75 This makes it possible to use a single serial port for either a
77 account with command line interface, or a
83 is the special device file in
85 to open for the terminal
90 If there is no argument or the argument is
92 the tty line is assumed to be open as file descriptor 0.
96 argument can be used to make
98 treat the terminal line specially.
99 This argument is used as an index into the
101 database, to determine the characteristics of the line.
102 If there is no argument, or there is no such table, the
107 a set of system defaults is used.
108 If indicated by the table located,
110 will clear the terminal screen,
111 print a banner heading,
112 and prompt for a login name.
113 Usually either the banner or the login prompt will include
119 facility with an action of
123 to execute site-specific commands when it starts.
125 Most of the default actions of
127 can be circumvented, or modified, by a suitable
133 program can be set to timeout after some interval,
134 which will cause dial up lines to hang up
135 if the login name is not entered reasonably quickly.
139 program is the same, except that it uses
141 to respect the locks in
143 of processes that dial out on that tty.
145 .Bl -tag -width /var/spool/lock/LCK..ttyXX -compact
148 .It Pa /var/spool/lock/LCK..ttyXX
152 .It "ttyxx: No such device or address."
153 .It "ttyxx: No such file or address."
154 A terminal which is turned on in the
156 file cannot be opened, likely because the requisite
157 lines are either not configured into the system, the associated device
158 was not attached during boot-time system configuration,
159 or the special file in