1 /* vi: set sw=4 ts=4: */
3 * Mini sulogin implementation for busybox
5 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
8 //usage:#define sulogin_trivial_usage
9 //usage: "[-t N] [TTY]"
10 //usage:#define sulogin_full_usage "\n\n"
11 //usage: "Single user login\n"
12 //usage: "\n -t N Timeout"
17 int sulogin_main(int argc
, char **argv
) MAIN_EXTERNALLY_VISIBLE
;
18 int sulogin_main(int argc UNUSED_PARAM
, char **argv
)
24 logmode
= LOGMODE_BOTH
;
25 openlog(applet_name
, 0, LOG_AUTH
);
27 opt_complementary
= "t+"; /* -t N */
28 getopt32(argv
, "t:", &timeout
);
34 dup(xopen(argv
[0], O_RDWR
));
39 /* Malicious use like "sulogin /dev/sda"? */
40 if (!isatty(0) || !isatty(1) || !isatty(2)) {
41 logmode
= LOGMODE_SYSLOG
;
42 bb_error_msg_and_die("not a tty");
45 /* Clear dangerous stuff, set PATH */
46 sanitize_env_if_suid();
56 r
= ask_and_check_password_extended(pwd
, timeout
,
57 "Give root password for system maintenance\n"
58 "(or type Control-D for normal startup):"
61 /* ^D, ^C, timeout, or read error */
62 bb_info_msg("Normal startup");
68 bb_do_delay(LOGIN_FAIL_DELAY
);
69 bb_info_msg("Login incorrect");
72 bb_info_msg("System Maintenance Mode");
74 IF_SELINUX(renew_current_security_context());
76 shell
= getenv("SUSHELL");
78 shell
= getenv("sushell");
80 shell
= pwd
->pw_shell
;
82 /* Exec login shell with no additional parameters. Never returns. */
83 run_shell(shell
, 1, NULL
, NULL
);
86 bb_error_msg_and_die("no password entry for root");