# workaround for bug PTREL-763
patch -p1 -d/ <<'EOF'
-diff -urN bad/etc/pam.d/systemd-user good/etc/pam.d/systemd-user
--- bad/etc/pam.d/systemd-user 2014-03-20 10:01:36.657843073 +0100
+++ good/etc/pam.d/systemd-user 2014-03-20 10:06:51.586121696 +0100
@@ -4,5 +4,6 @@
password required pam_deny.so
EOF
+# extra fix to avoid root and display sessions
+patch -p1 -d/ <<'EOF'
+--- bad/etc/pam.d/system-auth 2014-04-07 06:16:51.888018876 -0700
++++ good/etc/pam.d/system-auth 2014-04-07 06:16:46.335018503 -0700
+@@ -11,7 +11,6 @@
+ password required pam_deny.so
+
+ session optional pam_keyinit.so revoke
+-session optional pam_systemd.so
+ session required pam_limits.so
+ session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
+ session required pam_unix.so
+EOF
+
######### multiuser mode: create additional users
tizen_crypted_pass=$(perl -e 'print crypt("tizen", "aa")')
uid=5001