Fact-checked by Grok 2 weeks ago

Single-user mode

Single-user mode is a specialized boot mode in Unix-like operating systems, including distributions and macOS, that initializes the system with minimal services and processes, restricting access to a single () session via a command-line console for diagnostic, , and tasks. Similar minimal recovery modes exist in other operating systems such as Microsoft Windows. This , also known as runlevel 1 in systems using the SysV init tradition (mapped to rescue.target in systemd-based systems), disables networking, graphical interfaces, and most daemons to provide a stable environment for operations like filesystem repairs (e.g., running ), password resets, or configuration changes when normal multi-user operation is impossible due to corruption or failures. In , it typically mounts only essential filesystems such as /, /bin, and /sbin, resulting in far fewer running processes—often around 20 compared to over 70 in full multi-user graphical modes—enhancing system stability during repairs. Historically rooted in early Unix systems for administrative access, single-user mode has evolved but remains a core recovery tool, though its implementation varies by platform. In modern environments, administrators can enter it by editing the bootloader menu to append single or 1 to the parameters (which activates rescue.target in ), or by issuing telinit 1 or systemctl [rescue](/page/Rescue) from a running system as root. For macOS on Intel-based Macs without T2 chip, it was traditionally accessed by holding Command-S during startup to boot into a minimal , allowing direct filesystem access for tasks like mounting volumes read-write with /sbin/mount -uw /. However, Apple disabled direct Command-S access starting with (10.14) for security reasons, requiring users to enter Recovery Mode (Command-R) and use instead; on T2-equipped Intel Macs, enabling it also requires adjusting Startup Security Utility settings to "No Security," while on (M-series) Macs, traditional single-user mode is unavailable and Recovery Mode provides equivalent access. Due to its unrestricted root privileges, single-user mode poses security risks if accessed without authentication, prompting recommendations for root password protection or firmware passwords in production environments. It contrasts with other recovery options like , which loads essential extensions but allows multi-user graphical access, or , which displays boot logs without restricting services. Overall, single-user mode exemplifies a fundamental of providing low-level administrative control, though its use has diminished in cloud and containerized systems favoring automated recovery tools.

Overview

Definition and Characteristics

Single-user mode is a restricted boot state in Unix-like operating systems where the system initializes with a minimal set of services, permitting access exclusively to a single () user through a , while disabling networking and multi-user logins. This mode contrasts with the standard multi-user mode, which supports concurrent logins from multiple users, full networking capabilities, and a broader array of running services for everyday operations. Key characteristics include the absence of a (GUI), with the system presenting a text-based for interaction; suppression of non-essential daemons and processes to minimize resource usage and potential interference during maintenance; and initial mounting of local filesystems, often in read-write mode for the filesystem but potentially read-only for others to prevent . Networking is typically not enabled, isolating the system from external connections, and only —such as basic system mounts and a —are activated to facilitate focused administrative tasks. This configuration enforces exclusivity to one session, ensuring that no other users or processes can interfere with ongoing repairs or configurations. Accessing single-user mode requires physical or remote console access to the system, as it does not support remote logins. It is typically invoked by specifying parameters in the boot loader, such as appending a keyword to the command line, or through dedicated recovery options in certain systems.

Purposes and Common Uses

Single-user mode serves primarily as a maintenance and recovery environment in operating systems, enabling administrators to perform critical repairs without the interference of multi-user operations or running services. One key purpose is system repair, particularly addressing corrupted filesystems by allowing unmounted access to partitions for diagnostic and corrective actions. Another essential use is password recovery, where forgotten administrative credentials, such as the root password, can be reset directly through the mode's shell access. Additionally, it facilitates software installation and updates without concurrent user activity, ensuring stability during processes like loading kernel modules or applying patches that require exclusive system control. Hardware diagnostics also benefit from this mode, as it provides a controlled setting to test components without background processes complicating results. Common applications include executing filesystem integrity checks to identify and fix errors on critical volumes, editing essential configuration files like those managing accounts, and conducting isolated backups to prevent corruption during transfer. For instance, administrators might use it to repair a damaged filesystem or test new modules before full deployment, minimizing disruptions in production environments. These tasks are particularly valuable when normal multi-user operation would lock resources or introduce conflicts from active sessions. The mode offers advantages such as reduced , as it boots with minimal services and daemons, freeing CPU, , and I/O for intensive repair work. It also provides isolation from potential user errors, , or intrusions, creating a secure, root-only for sensitive operations. However, improper handling poses risks, including potential if filesystems fail to mount correctly or if repairs like filesystem checks are executed without backups.

History

Origins in Early Unix

Single-user mode originated in the early development of Unix at Bell Laboratories during the 1970s, where it served as a foundational mechanism for system initialization and maintenance in resource-constrained environments. The operating system, initially prototyped by Ken Thompson on a PDP-7 minicomputer in 1969–1970, supported only a single user program in core memory at a time, lacking multi-programming capabilities and featuring just two processes—one per terminal—without advanced process control primitives like fork or wait. This early incarnation, while not formally multi-user, laid the groundwork for distinguishing operational states, as Unix evolved rapidly following its port to the more capable PDP-11 in 1971 by Thompson and Dennis Ritchie. The design emphasized simplicity and efficiency, influenced by the developers' experiences porting and refining the system for Bell Labs' computing needs, where hardware limitations like 16-bit addressing and modest RAM (often 64 KB or less) made full multi-user operation demanding. By the mid-1970s, as Unix matured into a system supporting multiple concurrent users via the PDP-11's , the process provided for a single-user on for administrative tasks without immediately invoking the full multi-user . This allowed the system to initialize with minimal services, providing direct console access to a for root-level operations such as checks or repairs. The early rationale for single-user mode stemmed from the realities of 1970s minicomputers, where enabling multi-user features—such as multiple ttys and getty processes—consumed significant memory and processing cycles, often leaving little for actual workloads on systems with 128 KB or less. By booting with a single-user , administrators could perform critical tasks like on the root or reconfiguration without immediately transitioning to multi-user mode, mitigating and in ' research . This approach reflected the developers' pragmatic design philosophy, prioritizing reliability and ease of recovery in an era when reboots were frequent and time-consuming. The concept was first formally documented in the release of 1979, with the init(8) man page describing how the process, invoked during , opens the console device (/dev/console) to launch a in single-user mode if no multi-user transition occurs. If the shell exits, init proceeds to multi-user mode by executing /etc/rc for system startup tasks like mounting file systems and spawning processes. This documentation, part of the standard Unix Programmer's Manual, solidified single-user mode as an essential tool for administrators, enabling maintenance without the overhead of multi-user daemons and terminals.

Evolution Across Operating Systems

The concept of single-user mode, first distinguished in in 1971 and defaulting to single-user by Version 7 in 1979, proliferated across Unix variants in the as systems emphasized reliable recovery mechanisms. In (BSD) implementations, starting from 4BSD in the early , single-user mode became a core boot option, providing a shell for filesystem checks and repairs without loading multi-user daemons, reflecting the need for robust administrative access in academic and research environments. Similarly, AT&T's , released in 1983, integrated single-user functionality, with System V Release 3 (SVR3) in 1987 introducing the /etc/inittab file to define s—where 1 explicitly denoted single-user mode for maintenance. This was further standardized in System V Release 4 (SVR4) in 1988, unifying behaviors across commercial Unix implementations like and to facilitate consistent system administration. The single-user mode paradigm extended beyond Unix into proprietary operating systems in the 1990s, adapting to graphical user interfaces while retaining command-line recovery for stability in consumer and enterprise settings. Early versions of Windows NT, such as NT 3.1 launched in 1993, provided recovery options using installation floppies to access and repair system files without full multi-user initialization; this evolved into the Recovery Console in (2000), a text-based environment akin to single-user mode for tasks such as disk checks and registry edits. In Apple's ecosystem, macOS (then "Cheetah"), released in 2001, incorporated single-user mode through its kernel—a BSD derivative—enabling boot into a prompt by holding Command-S, primarily to address filesystem issues and configuration in a GUI-centric OS without network or desktop services. In the 2010s, the evolution shifted toward more flexible and secure implementations, particularly with the rise of in distributions starting around 2010. replaced rigid runlevels with declarative targets, where the .target emulates traditional single-user mode by mounting filesystems and starting essential services for a minimal , while .target offers an even leaner option; this transition, led by , improved parallelism in booting and integration with modern hardware. Concurrently, in cloud and virtualized environments, single-user mode adapted for —such as via consoles in AWS or — with security enhancements like bootloader passwords to block unauthorized entry and full-disk encryption (e.g., LUKS) requiring passphrase prompts even in modes, mitigating risks from physical or virtual console access.

Unix-like Systems

General Boot Mechanisms

In systems, the boot process into single-user mode begins with interaction at the boot loader stage, where users append specific parameters to the command line to request S or 1. This directs the system to initialize with limited services, enabling root-level maintenance such as filesystem repairs or configuration changes. Boot loaders like facilitate this by allowing temporary edits to menu entries: at the GRUB menu, pressing 'e' opens the editor, where 'single' or '1' is added to the end of the 'linux' command line (e.g., linux /vmlinuz root=/dev/sda1 single), followed by Ctrl-X to boot. With LILO, users enter 'linux single' or 'linux 1' directly at the boot prompt to invoke the mode, assuming the default image label is 'linux'. For SPARC systems using OpenBoot PROM, the 'ok' prompt accepts 'boot -s' to load the kernel in single-user state after halting the system with 'init 0'. Upon loading, the process (PID 1) assumes control as the parent of all processes and consults /etc/inittab to handle the specified . For S or 1, executes sysinit and bootwait entries first, then runs /sbin/rcS to mount the filesystem read-write along with /usr, /var, and /tmp as needed for basic operations. It subsequently starts a shell directly on the console, often via a respawn entry in /etc/inittab (e.g., s1:1:respawn:/sbin/rc1), providing an interactive environment without network or multi-user services. The /etc/inittab file structures these transitions, with fields defining runlevels, actions (e.g., wait, respawn), and processes for each state. To leave single-user mode, entering 'exit' at the signals to terminate the session and advance to the default (typically 2 or 3 for multi-user operation), resuming normal boot scripts. Alternatively, '' invokes 6 to shut down and restart into the standard multi-user mode, or ' 6' achieves the same effect directly. These mechanisms ensure controlled exits, preserving /etc/inittab-defined behaviors.

Configuration and Access Methods

In Unix-like systems, single-user mode typically mounts the root filesystem as read-only to ensure system integrity during . To enable modifications, administrators can remount it read-write using system-specific commands, such as mount -o remount,rw / in or mount -uw / in , which allows writing to the root partition without rebooting. This step is essential before performing tasks like editing files or installing updates. Filesystem integrity checks are commonly performed in single-user mode using the fsck utility, which scans and repairs inconsistencies on unmounted or minimally mounted partitions. The command fsck -y /dev/sdX automatically fixes errors without prompting, making it suitable for the root filesystem after remounting it read-write if necessary; however, for the root device, it is often run before full mounting to avoid corruption risks. Access to single-user mode is managed through the sulogin utility, which presents a root shell prompt upon entry. By default, if the root password files are intact, sulogin requires the root password for authentication; however, if these files are damaged or absent, it grants root access without prompting, posing a security risk. To enforce password protection explicitly, the /etc/default/sulogin file can be configured with the PASSREQ=YES option, ensuring the root password is always required regardless of file integrity. Customization of single-user mode behavior is achieved by editing boot initialization scripts, such as /etc/[rc](/page/rc) in systems like , which is invoked with the single=YES argument to limit services and mount only essential filesystems. Administrators can modify this script to include automated tasks, like custom mounts or preliminary checks, before the shell prompt appears. For broader system tweaks affecting single-user entry, settings in /etc/rc.conf control aspects like console security and default selection. Logging in single-user mode is minimal due to limited services, but any enabled events, such as operations or fsck outputs, are typically recorded in /var/log/messages if the daemon is partially active or configured to persist. This file serves as the primary repository for and maintenance messages, allowing post-session review of actions performed.

Linux-Specific Implementations

In legacy systems using SysV init, single-user mode corresponds to 1, which is defined in the /etc/inittab file as the default or targeted for minimal operation, typically with a line such as "id:1:initdefault:" to set it as the initial state after scripts. This directs the to execute essential scripts from /etc/init.d/, including the /etc/init.d/single script, which provides a shell for maintenance tasks while halting non-essential services like networking. To enter single-user mode from a running , administrators use the telinit 1 command, which signals the to transition to 1 and invoke the associated scripts. Modern distributions, adopting as the init system since around 2010, replace s with s, where serves as the equivalent to SysV's single-user mode ( 1), mounting the filesystem read-write and providing a for without starting multi-user services. Activation occurs via systemctl isolate , which isolates the system to this target and stops other services, or by booting with the systemd.unit= appended to the GRUB command line. For even more minimal access, emergency.target offers a basic without full filesystem mounting, invoked similarly with systemctl isolate emergency.target or the corresponding . Major distributions like and have defaulted to since 2015, with switching in version 15.04 and in version 8 (Jessie), ensuring broad compatibility for these target-based single-user implementations across contemporary environments. This shift maintains backward compatibility for SysV scripts via generators but prioritizes 's declarative units for precise control in rescue scenarios.

BSD and Derivatives

In BSD-based systems, single-user mode provides a minimal environment for maintenance tasks, such as filesystem repairs, differing from Linux implementations by relying on loader prompts and rc-based initialization rather than runlevels or systemd. FreeBSD enters single-user mode by specifying the -s flag at the loader prompt (e.g., boot -s), which boots the kernel with the RB_SINGLE flag set, resulting in a root shell on the console without executing multi-user startup scripts. In this mode, the root filesystem is mounted read-only initially to prevent accidental damage, and users must manually remount it read-write with mount -uw / after running fsck if needed for consistency checks. Networking is not enabled by default but can be started manually via /etc/rc.d/netif start if required for tasks like remote access, with options controlled by settings in /etc/rc.conf. NetBSD and OpenBSD employ similar mechanisms, using the -s flag at the boot loader prompt to invoke single-user mode via the RB_SINGLE boothowto flag, providing a shell for repairs while skipping full multi-user initialization. In NetBSD, /etc/rc.single executes basic setup scripts after filesystem checks, handling tasks like mounting non-root filesystems if succeeds. OpenBSD, prioritizing security, configures the console as "secure" in /etc/ttys by default, requiring the password to enter the single-user shell and preventing unauthorized physical access; privilege escalation tools like (OpenBSD's lightweight alternative) align with this emphasis on minimal, audited access, though the mode itself grants direct privileges. Both systems mount the root filesystem read-only initially and support manual execution for UFS or other supported filesystems before proceeding. Derivatives like inherit these loader-based approaches, entering single-user mode via the -s flag or boot menu selection, with configurations editable in /boot/boot.cfg for custom kernel parameters. This mode supports filesystem-specific checks, such as hammer fsck for integrity verification and repair, which runs manually after remounting filesystems read-write, extending the traditional BSD model to handle DragonFly's advanced storage features without automatic multi-user services.

Microsoft Windows

Windows NT Family

In the Windows NT family, single-user mode equivalents primarily manifest through specialized recovery environments designed to facilitate system repairs, , and without loading the full or multi-user services. These mechanisms adapt the core purpose of single-user mode—providing isolated access for maintenance—into Windows-specific tools that prioritize stability and enterprise needs, such as fixing boot issues or restoring directory services. The foundational recovery tool in the NT lineage is the Recovery Console, introduced with on February 17, 2000, which offers a for limited file access, disk repairs, and boot configuration on and volumes. This was succeeded by the Windows Recovery Environment (WinRE) starting in , evolving into a more comprehensive set of diagnostic and repair options that can be invoked to address unbootable states caused by corrupted files, driver failures, or hardware issues. WinRE includes an automatic repair feature that triggers after multiple failed boot attempts, scanning for and resolving common problems like startup configuration errors. Accessing WinRE typically involves booting from Windows installation media, where selecting "Repair your computer" leads to options including a Command Prompt for executing utilities such as chkdsk to scan and repair disk errors or bootrec commands like /fixmbr, /fixboot, and /rebuildbcd to reconstruct boot records. Alternatively, on systems supporting it, users can enable legacy boot menus via bcdedit /set {default} bootmenupolicy legacy to access advanced options with F8 (or Shift+F8 on some configurations) during startup, though modern UEFI-based systems in Windows 10 and 11 favor Shift+Restart from the login screen or Settings > Update & Security > Recovery for seamless entry. Enhancements in Windows 10 and 11 integrate deeper UEFI support, allowing WinRE to handle secure boot environments and expanded push-button reset functionalities, while maintaining compatibility with tools like System File Checker (sfc /scannow) for integrity checks. However, in October 2025, a security update temporarily disabled USB input in WinRE, which was promptly addressed by a follow-up patch. For enterprise scenarios involving domain controllers, Directory Services Restore Mode (DSRM) provides a dedicated single-user-like boot option, introduced alongside Active Directory in Windows 2000 Server, enabling offline repairs to the directory database without multi-user interference. In DSRM, the boots into a restricted state using the local administrator account (separate from the domain admin), allowing tasks such as database recovery with ntdsutil for authoritative restores or password resets via ntdsutil set dsrm password. This mode is invoked by selecting it from the boot menu (F8 in legacy ) or configuring bcdedit /set {default} safeboot dsrepair for automatic entry on restart, ensuring isolated access to fix replication issues, errors, or corrupted Ntds.dit files before returning to normal Directory Services operation.

Windows 9x and ME

In and ME, single-user mode functionality was primarily accessed through variants, which provided a minimal graphical or command-line environment for troubleshooting system issues rooted in their heritage. with Command Prompt, often referred to as "Command Prompt Only," loaded only essential drivers such as basic VGA graphics, keyboard, and mouse support, bypassing most third-party configurations and the to present a DOS-like prompt (C:>). This allowed users to edit critical files like or directly using tools such as edit.com or copy commands, facilitating repairs to corrupted startup scripts or driver conflicts without the full interfering. To boot into Safe Mode with Command Prompt, users restarted the system and pressed F8 repeatedly upon seeing the "Starting Windows 95" or "Starting Windows 98" message to access the Startup Menu, then selected option 6 for "Safe mode command prompt only." The msconfig utility—available in Windows 98 and ME—enabled selective startup options under the General tab to enforce Safe Mode on subsequent boots, though command prompt access still required menu selection or manual shell exit. For broader recovery, an Emergency Boot Disk (EBD), created via the Add/Remove Programs applet or format a: /s command, provided a real-mode MS-DOS environment from a floppy diskette. Booting from the EBD granted read-write access to the C: drive on FAT file systems, enabling utilities like scandisk.exe for disk error checking and sys c: to transfer system files from the floppy to repair a non-booting installation in Windows 95 and 98; Windows ME extended this with similar floppy-based recovery but emphasized CD-ROM integration where available. These modes had inherent limitations, including the absence of networking support, as they prioritized local disk and configuration access over to avoid exacerbating driver-related crashes. No option for "Safe Mode with Networking" existed, unlike later NT-based systems, restricting tasks to offline repairs. Following Windows ME's release in 2000, these DOS-derived recovery mechanisms were phased out in favor of the NT kernel's Recovery Console in subsequent Windows versions, marking the end of the 9x consumer line's single-user approaches.

macOS

Booting into Single-user Mode

Booting into single-user mode on macOS, a operating system derived from , provides a minimal command-line environment for advanced by loading the without the graphical Aqua interface. This mode inherits general boot mechanisms, such as initialization followed by a filesystem mount, but is tailored to Apple's hardware and security features. For Intel-based Macs running macOS versions prior to Mojave (10.14), users boot into single-user mode by restarting the computer and immediately holding down the Command (⌘) + S keys until a black screen with white text appears, indicating the verbose boot process. This key combination interacts with the EFI firmware to bypass the standard multi-user boot sequence, loading a minimal kernel environment. In macOS Mojave and later versions, including on Intel hardware, this direct key-based method is disabled for security reasons. The standard alternative is to boot into macOS Recovery by holding Command (⌘) + R during startup, then select Utilities > Terminal from the Recovery interface to access a root shell. For T2-equipped Intel Macs, if external booting or reduced security is needed, adjust settings in Startup Security Utility to "Medium Security" or "No Security" via Recovery. On Macs (introduced in 2020 with the chip and later models), traditional key combinations like Command + S are not supported due to the integrated secure boot architecture; direct single-user mode is unavailable. Instead, users access an equivalent root command-line state via macOS . To do this, shut down the Mac, then press and hold the power button until the "Loading startup options" screen appears, release it, and select Options to enter mode. From the interface, choose Utilities > to open a root . As of macOS (2024) and subsequent releases, this remains the primary method for root-level access in a minimal environment. Once booted, single-user mode presents a root shell prompt on the console device /dev/console, with the root filesystem initially mounted read-only to prevent corruption. The system automatically performs a filesystem check using fsck if inconsistencies are detected during kernel initialization, displaying verbose logging of the boot sequence and any repairs on the screen. Users must manually remount the filesystem as read-write with mount -uw / to perform modifications, after which standard Unix commands are available for maintenance tasks. To exit and reboot normally, type reboot at the prompt.

Troubleshooting Applications

Single-user mode in macOS offers a root shell environment for performing targeted diagnostics and repairs on systems where standard booting fails or advanced access is required, particularly on Intel-based Macs where it remains accessible despite deprecation in favor of Recovery mode since macOS Mojave. This mode bypasses the graphical interface and multi-user processes, providing direct filesystem and configuration manipulation without interference from running services. A core application involves filesystem repairs, essential for resolving corruption that prevents normal startup. Administrators can execute /sbin/fsck -fy to verify and automatically repair HFS+ volumes by scanning for inconsistencies in the and inode information. For APFS volumes, introduced in , the fsck_apfs command serves a similar purpose, checking container integrity and repairing snapshots or allocation errors. Following verification, the root filesystem is typically read-only; remounting it read-write enables further modifications via /sbin/mount -uw / or diskutil mount / to apply changes or access protected areas. Configuration edits represent another vital use, allowing direct intervention in system settings inaccessible during regular operation. The /etc/fstab file can be edited with tools like vi to adjust mount points or options for volumes, though macOS relies less on it than traditional Unix systems due to automated disk management. Launchd property list files in /System/Library/LaunchDaemons/ or /Library/LaunchDaemons/ can be modified using plutil or text editors to tweak service behaviors, such as disabling problematic daemons before reboot. Password resets for user accounts are facilitated by first loading the Directory Services framework with launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist, followed by the passwd command to set a new password for the root or target user. Advanced troubleshooting leverages single-user mode for specialized tasks beyond basic repairs. Kernel extensions can be tested by loading them manually with kextload to isolate compatibility issues without full system boot, aiding in debugging third-party drivers. Time Machine restores are possible via the tmutil command, allowing selective recovery of files or volumes from backups mounted in the environment. On Intel-based hardware, Target Disk Mode provides an alternative for data extraction by connecting the Mac as an external drive to another system via Thunderbolt or USB-C (on T2 models), though it is a distinct mode from single-user mode.

References

  1. [1]
    Single User Mode Definition - The Linux Information Project
    Jun 16, 2006 · Single user mode, also referred to as maintenance mode and runlevel 1, is a mode of operation of a computer running Linux or another Unix-like operating system
  2. [2]
    33.2. Single-User Mode | Deployment Guide - Red Hat Documentation
    Single-user mode provides a Linux environment for a single user that allows you to recover your system from problems that cannot be resolved in networked multi- ...
  3. [3]
    Single-User Mode - Mac OS X in a Nutshell [Book] - O'Reilly
    Mac OS X has an unadvertised feature known as single-user mode, which lets you boot the system under the most minimal terms.
  4. [4]
    Mac startup key combinations - Apple Support
    Mar 13, 2025 · Command-S: Start up in single-user mode. Disabled in macOS Mojave or later. T: Start up in target disk mode. Command-V: Start up in verbose mode ...
  5. [5]
    Boot modes of an Intel-based Mac with an Apple T2 Security Chip
    Feb 18, 2021 · Some boot modes, such as Single User Mode, won't work unless the security policy is changed to No Security in Startup Security Utility. Mode.
  6. [6]
    Firmware password protection in an Intel-based Mac - Apple Support
    Feb 18, 2021 · The Firmware Password is designed to prevent selecting alternate boot modes such as booting into recoveryOS or Single User Mode, booting from an unauthorized ...
  7. [7]
    systemd.special(7) - Linux manual page - man7.org
    Isolate to this target in order to administer the system in single-user mode with all file systems mounted but with no services running, except for the most ...
  8. [8]
    Chapter 36. Basic System Recovery | Red Hat Enterprise Linux | 6
    In single-user mode, your computer boots to runlevel 1. Your local file systems are mounted, but your network is not activated. You have a usable system ...
  9. [9]
    9.5. Booting in single user mode
    Single user mode is necessary for a few administrative tasks, such as running fsck on a /usr partition, since this requires that the partition be unmounted, and ...
  10. [10]
    How to Reset the root Password - Fedora Docs
    Feb 11, 2025 · How to reset the root password in Rescue Mode ; Run the command: passwd ; Reboot the machine with: /sbin/reboot -f.
  11. [11]
    8.5. Single user mode
    This is useful for system administration tasks that can't be done while the system is running normally.
  12. [12]
    Repair Your Internal Drive in Single User Mode - Everything Macintosh
    To repair, boot into single user mode by holding Command-S, then type `/sbin/fsck -fy` and press return. The Mac will then run a diagnostic and repair.
  13. [13]
    How to Boot Into Single User Mode in AlmaLinux 8/9
    Feb 21, 2025 · The single user mode is particularly useful when you need to reset the root password, fix misconfigured settings, repair a damaged file system, ...<|separator|>
  14. [14]
  15. [15]
    Evolution of the Unix Time-sharing System - Nokia
    This paper presents a brief history of the early development of the Unix operating system. ... Bell Labs in Murray Hill, while the shell was done at MIT.
  16. [16]
    v7 init man page on unix.com
    This feature is used to bring up a single-user system. If the shell terminates, init comes up multi-user and the process described below is started. When init ...Missing: mode | Show results with:mode
  17. [17]
  18. [18]
    When was the UNIX single-user vs multi-user modes distinction first ...
    May 19, 2016 · Single user mode is generally intended for low-level system maintenance which cannot be performed while the system is up and running normally, ...linux + single user mode and set networkis there a proper way to shut down from single user modeMore results from unix.stackexchange.com
  19. [19]
    Troubleshooting Windows Startup and Shutdown Problems
    Sep 15, 2012 · This chapter, from Windows Internals, Part 2, 6th Edition, describes the steps required to boot Windows and the options that can affect system startup.<|separator|>
  20. [20]
    systemd.special
    ### Summary: How systemd Handles Single-User Mode with Targets
  21. [21]
    Chapter 2. Security Tips for Installation | Red Hat Enterprise Linux | 7
    This makes it possible for them to enter rescue mode or single user mode, which in turn allows them to start arbitrary processes on the system or copy sensitive ...
  22. [22]
    The /etc/inittab File (System Administration Guide
    When you boot the system or change run levels with the init or shutdown command, the init daemon starts processes by reading information from the /etc/inittab ...
  23. [23]
    init - the Learn Linux Project
    Runlevel S or s bring the system to single user mode and do not require an /etc/inittab file. In single user mode, a root shell is opened on /dev/console. ONLY ...
  24. [24]
  25. [25]
    How do I boot into single user mode using the LILO boot loader?
    Sep 16, 2012 · You can boot into Linux single user mode by issuing one of the following commands at the LILO boot prompt. This example assumes the name of ...
  26. [26]
    How to Boot a System to a Single-User State (Run Level S)
    Jul 2, 2014 · Bring the system to the ok PROM prompt. # init 0 · Boot the system to a single-user state. ok boot -s · Type the root password when the following ...
  27. [27]
    AIX
    ### Summary on Runlevel S or Single-User Mode in inittab and init's Behavior
  28. [28]
    How to Reboot a System by Using the init Command
    Jul 2, 2014 · The init 6 command stops the operating system and reboots to the state that is defined by the initdefault entry in the /etc/inittab file.
  29. [29]
    Chapter 15. The FreeBSD Booting Process
    Aug 29, 2025 · Single-user mode is usually used to repair a system that will not boot due to an inconsistent file system or an error in a boot configuration ...
  30. [30]
    mount(8) - Linux manual page - man7.org
    The mount command compares filesystem source, target (and fs root for bind mount or btrfs) to detect already mounted filesystems. The kernel table with already ...
  31. [31]
    SystemAdministration/Fsck - Community Help Wiki
    Sep 4, 2017 · Fsck should always be run in single user mode other wise data can be corrupted. Fsck runs in two modes: interactive - where each error ...
  32. [32]
    12.2. File System-Specific Information for fsck
    The -p option tells e2fsck to automatically do all repairs that may be done safely. If user intervention is required, e2fsck indicates the unfixed problem in ...
  33. [33]
    sulogin(8): Single-user login - Linux man page - Die.net
    sulogin can be invoked by init(8) when the system goes into single user mode. (This is done through an entry in inittab(5).)
  34. [34]
    sulogin - man pages section 8: System Administration Commands
    Jul 27, 2022 · Determines if login requires a password. The default is YES. /etc/default/login. Default value can be set for the following flag: SLEEPTIME.
  35. [35]
  36. [36]
    Linux Logging Basics - The Ultimate Guide To Logging - Loggly
    Some of the most important Linux system logs include: /var/log/syslog and /var/log/messages store all global system activity data, including startup messages. ...Missing: mode | Show results with:mode
  37. [37]
    [PDF] An Approach to UNIX Security Logging
    Oct 8, 1998 · Suggested logging: It is possible to log the actions performed during single-user mode, but this is not normally done. The single-user mode ...
  38. [38]
    1.4. SysV Init Runlevels | Reference Guide | Red Hat Enterprise Linux
    For instance, runlevel 1 (single user mode) halts any network services, while runlevel 3 starts these services. By assigning specific services to be halted or ...
  39. [39]
    sysvinit - Gentoo Wiki
    If the default runlevel is single user mode, init enters it. If single user mode is later left, the boot sequence resumes. It starts all processes that have an ...
  40. [40]
    08-C.8.3: Managing Linux Services - SysVinit - Engineering LibreTexts
    Oct 3, 2022 · An important run level is single user mode (run level 1), in which only the system administrator is using the machine and as few system services ...
  41. [41]
    systemd - Ubuntu Wiki
    Jan 22, 2015 · systemd is under active development in Ubuntu although the rough plan would be to default to systemd during development of 15.04. If you ...
  42. [42]
    systemd - Debian Wiki
    Jan 19, 2025 · systemd is a system and service manager for Linux. It is the default init system for Debian since Debian 8 ("jessie"). Systemd is compatible with SysV and LSB ...
  43. [43]
    loader(8)
    ### Summary of Single-User Mode Boot Options and `-s` Flag in FreeBSD
  44. [44]
    init(8)
    ### Summary of Single-User Mode in FreeBSD (init(8))
  45. [45]
    boot(8) - NetBSD Manual Pages
    ### Summary of Booting into Single-User Mode in NetBSD (boot.8)
  46. [46]
    boot(8) - OpenBSD manual pages
    ### Summary of Single-User Mode, -s Flag, and RC Scripts in Single-User Mode for OpenBSD (from boot.8)
  47. [47]
    init(8) - OpenBSD manual pages
    In single-user mode, the rc(8) script is not run and normal daemons are not started, but instead a super-user shell is started on the system console.
  48. [48]
    Booting - DragonFlyBSD
    Apr 11, 2020 · DragonFly's boot process provides a great deal of flexibility in customizing what happens when you start the system, allowing you to select from ...Missing: cfg | Show results with:cfg
  49. [49]
    hammer() - DragonFly On-Line Manual Pages
    config [filesystem [configfile]] (HAMMER VERSION 3+) Show or change configuration for filesystem. If zero or one arguments are specified this function dumps the ...
  50. [50]
    Windows Recovery Environment (Windows RE) | Microsoft Learn
    Feb 9, 2023 · Windows Recovery Environment (WinRE) is a recovery environment that can repair common causes of unbootable operating systems.Deploy Windows RE · WinRE troubleshooting features · Hardware recovery button
  51. [51]
    WinRE troubleshooting features | Microsoft Learn
    Dec 15, 2021 · This topic describes the automatic failover behavior, manual diagnosis, and repair process in WinRE.
  52. [52]
    Use WinRE to troubleshoot startup issues - Windows Server
    Jan 15, 2025 · This article describes how to start WinRE from Windows installation media to troubleshoot common startup issues.
  53. [53]
    Windows boot issues troubleshooting - Microsoft Learn
    Apr 28, 2025 · To troubleshoot this problem, use Windows installation media to start the computer, press Shift+F10 for a command prompt, and then use any of ...
  54. [54]
    How to restore an Active Directory server - Microsoft Learn
    Sep 23, 2025 · Active Directory servers must be restored offline. The system must be restarted in Directory Services Restore mode.
  55. [55]
    How to reset the Directory Services Restore Mode administrator ...
    Jan 15, 2025 · This article describes how to reset the Directory Services Restore Mode (DSRM) administrator password for any server in your domain without restarting the ...
  56. [56]
    Troubleshooting Windows 95 Using Safe Mode (156126)
    Restart the computer. When you see the "Starting Windows 95" message, press the F8 key, and then choose Command Prompt Only from the Startup menu. NOTE ...
  57. [57]
    How to Start a Windows 98-Based Computer in Safe Mode (180902)
    Press F8, and then press F8. When you do this, the Windows 98 Startup menu is displayed. Select the Safe Mode menu option from the Startup menu, and then press ...<|separator|>
  58. [58]
    How to Open Safe Mode - Computer Hope
    Jun 1, 2025 · Press the Windows key + R together to access the Run option. · Type msconfig in the Open: field. · In the System Configuration window, click the ...Windows 11 · Windows 8 · Windows 95 · Windows Command Prompt
  59. [59]
    the Windows 98 Readme.txt File from the Boot Disk
    Restart your computer using the Windows 98 Startup Disk, select option 2 on the Startup menu, and then press ENTER. 2. At the A:\ prompt, type: SYS X: (where X ...
  60. [60]
    How to start Windows in Safe Mode - Bleeping Computer
    Apr 21, 2004 · When you boot into Safe Mode the operating system only loads the bare minimum of software that is required for the operating system to work.Windows 98/ME · Windows XP · Windows Vista · Windows 7
  61. [61]
    Creating an Emergency Boot Disk - Windows® 98 Unleashed [Book]
    Windows 98 gives you two methods of creating bootable floppy disks: You can use the Format command to either copy the necessary system files to an already ...
  62. [62]
    Startup modes for M1 Macs - The Eclectic Light Company
    Nov 28, 2020 · Once the Startup Options screen appears, press and hold the Command and D keys until your Mac restarts and the Diagnostics Loader menu appears ...<|separator|>
  63. [63]
    How to Boot in Single User Mode on a Mac - OSXDaily
    Oct 29, 2018 · This tutorial will show you how to boot into Single User Mode and how to exit Single User Mode on any Mac.
  64. [64]
    How to start up from macOS Recovery - Apple Support
    Oct 29, 2025 · Start up from macOS Recovery (Mac with Apple silicon) · Make sure that your Mac is turned off. · Press and hold the power button again. · Click ...
  65. [65]
    Root single mode on m1 mac - Apple Support Communities
    May 21, 2022 · Single User Mode does exist on M1 Macs— however it requires the security downgrade and using the Recovery Mode to access Terminal. ref: Use ...
  66. [66]
    How to Repair a Mac Disk with fsck from Single User Mode
    Aug 7, 2013 · The command in the article is “fsck -fy” and it should be used on the primary disk from single user mode, or from recovery mode or a boot disk.
  67. [67]
    How to use fsck to check and repair macOS disks - AppleInsider
    Dec 21, 2022 · fsck, or "file system consistency check," is a UNIX tool that has been around for a long time. It checks storage disks for errors, and attempts to repair any ...
  68. [68]
    fsck Man Page - macOS - SS64.com
    In interactive mode, fsck will list the conversion to be made and ask whether the conversion should be done. If a negative answer is given, no further ...