1 /* vi: set sw=4 ts=4: */
3 * Mini sulogin implementation for busybox
5 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
8 //usage:#define sulogin_trivial_usage
9 //usage: "[-t N] [TTY]"
10 //usage:#define sulogin_full_usage "\n\n"
11 //usage: "Single user login\n"
12 //usage: "\n -t N Timeout"
17 int sulogin_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
18 int sulogin_main(int argc UNUSED_PARAM, char **argv)
24 logmode = LOGMODE_BOTH;
25 openlog(applet_name, 0, LOG_AUTH);
27 opt_complementary = "t+"; /* -t N */
28 getopt32(argv, "t:", &timeout);
34 dup(xopen(argv[0], O_RDWR));
39 /* Malicious use like "sulogin /dev/sda"? */
40 if (!isatty(0) || !isatty(1) || !isatty(2)) {
41 logmode = LOGMODE_SYSLOG;
42 bb_error_msg_and_die("not a tty");
45 /* Clear dangerous stuff, set PATH */
46 sanitize_env_if_suid();
56 r = ask_and_check_password_extended(pwd, timeout,
57 "Give root password for system maintenance\n"
58 "(or type Control-D for normal startup):"
61 /* ^D, ^C, timeout, or read error */
62 bb_info_msg("Normal startup");
68 bb_do_delay(LOGIN_FAIL_DELAY);
69 bb_info_msg("Login incorrect");
72 bb_info_msg("System Maintenance Mode");
74 IF_SELINUX(renew_current_security_context());
76 shell = getenv("SUSHELL");
78 shell = getenv("sushell");
80 shell = pwd->pw_shell;
82 /* Exec login shell with no additional parameters. Never returns. */
83 run_shell(shell, 1, NULL, NULL);
86 bb_error_msg_and_die("no password entry for root");