parent
dc5eb1f3a1
commit
9ce4ea8d31
456
fix-autologin.patch
Normal file
456
fix-autologin.patch
Normal file
@ -0,0 +1,456 @@
|
|||||||
|
From eb6d8d221b34a93e57c22cefa47d924350251c4c Mon Sep 17 00:00:00 2001
|
||||||
|
From: Ray Strode <rstrode@redhat.com>
|
||||||
|
Date: Thu, 15 Oct 2015 14:37:33 -0400
|
||||||
|
Subject: [PATCH] daemon: fork before threads are spawned
|
||||||
|
|
||||||
|
It's not really a good idea to fork after glib has initialized,
|
||||||
|
since it has helper threads that may have taken locks etc.
|
||||||
|
|
||||||
|
This commit forks really early to prevent locks from leaking
|
||||||
|
and causing deadlock.
|
||||||
|
---
|
||||||
|
daemon/gkd-main.c | 75 ++++++++++++++++++++++++++++++++++++++++++++++---------
|
||||||
|
1 file changed, 63 insertions(+), 12 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/daemon/gkd-main.c b/daemon/gkd-main.c
|
||||||
|
index f567633..4cc8552 100644
|
||||||
|
--- a/daemon/gkd-main.c
|
||||||
|
+++ b/daemon/gkd-main.c
|
||||||
|
@@ -98,60 +98,61 @@ EGG_SECURE_DECLARE (daemon_main);
|
||||||
|
# else
|
||||||
|
# define DEFAULT_COMPONENTS GKD_COMP_PKCS11 "," GKD_COMP_SECRETS
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If --login is used and then daemon is not initialized within LOGIN_TIMEOUT
|
||||||
|
* seconds, then we exit. See on_login_timeout() below.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define LOGIN_TIMEOUT 120
|
||||||
|
|
||||||
|
static gchar* run_components = DEFAULT_COMPONENTS;
|
||||||
|
static gboolean pkcs11_started = FALSE;
|
||||||
|
static gboolean secrets_started = FALSE;
|
||||||
|
static gboolean ssh_started = FALSE;
|
||||||
|
static gboolean dbus_started = FALSE;
|
||||||
|
|
||||||
|
static gboolean run_foreground = FALSE;
|
||||||
|
static gboolean run_daemonized = FALSE;
|
||||||
|
static gboolean run_version = FALSE;
|
||||||
|
static gboolean run_for_login = FALSE;
|
||||||
|
static gboolean perform_unlock = FALSE;
|
||||||
|
static gboolean run_for_start = FALSE;
|
||||||
|
static gboolean run_for_replace = FALSE;
|
||||||
|
static gchar* login_password = NULL;
|
||||||
|
static gchar* control_directory = NULL;
|
||||||
|
static guint timeout_id = 0;
|
||||||
|
static gboolean initialization_completed = FALSE;
|
||||||
|
static GMainLoop *loop = NULL;
|
||||||
|
+static int parent_wakeup_fd = -1;
|
||||||
|
|
||||||
|
static GOptionEntry option_entries[] = {
|
||||||
|
{ "start", 's', 0, G_OPTION_ARG_NONE, &run_for_start,
|
||||||
|
"Start a dameon or initialize an already running daemon." },
|
||||||
|
{ "replace", 'r', 0, G_OPTION_ARG_NONE, &run_for_replace,
|
||||||
|
"Replace the daemon for this desktop login environment." },
|
||||||
|
{ "foreground", 'f', 0, G_OPTION_ARG_NONE, &run_foreground,
|
||||||
|
"Run in the foreground", NULL },
|
||||||
|
{ "daemonize", 'd', 0, G_OPTION_ARG_NONE, &run_daemonized,
|
||||||
|
"Run as a daemon", NULL },
|
||||||
|
{ "login", 'l', 0, G_OPTION_ARG_NONE, &run_for_login,
|
||||||
|
"Run by PAM for a user login. Read login password from stdin", NULL },
|
||||||
|
{ "unlock", 0, 0, G_OPTION_ARG_NONE, &perform_unlock,
|
||||||
|
"Prompt for login keyring password, or read from stdin", NULL },
|
||||||
|
{ "components", 'c', 0, G_OPTION_ARG_STRING, &run_components,
|
||||||
|
"The optional components to run", DEFAULT_COMPONENTS },
|
||||||
|
{ "control-directory", 'C', 0, G_OPTION_ARG_FILENAME, &control_directory,
|
||||||
|
"The directory for sockets and control data", NULL },
|
||||||
|
{ "version", 'V', 0, G_OPTION_ARG_NONE, &run_version,
|
||||||
|
"Show the version number and exit.", NULL },
|
||||||
|
{ NULL }
|
||||||
|
};
|
||||||
|
|
||||||
|
static void
|
||||||
|
parse_arguments (int *argc, char** argv[])
|
||||||
|
{
|
||||||
|
GError *err = NULL;
|
||||||
|
GOptionContext *context;
|
||||||
|
|
||||||
|
context = g_option_context_new ("- The Gnome Keyring Daemon");
|
||||||
|
@@ -474,60 +475,110 @@ read_login_password (int fd)
|
||||||
|
}
|
||||||
|
|
||||||
|
egg_secure_free (buf);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
cleanup_and_exit (int code)
|
||||||
|
{
|
||||||
|
egg_cleanup_perform ();
|
||||||
|
exit (code);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
clear_login_password (void)
|
||||||
|
{
|
||||||
|
if(login_password)
|
||||||
|
egg_secure_strfree (login_password);
|
||||||
|
login_password = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
print_environment (void)
|
||||||
|
{
|
||||||
|
const gchar **env;
|
||||||
|
for (env = gkd_util_get_environment (); *env; ++env)
|
||||||
|
printf ("%s\n", *env);
|
||||||
|
fflush (stdout);
|
||||||
|
}
|
||||||
|
|
||||||
|
+
|
||||||
|
+static void
|
||||||
|
+print_environment_from_fd (int fd)
|
||||||
|
+{
|
||||||
|
+ char *output;
|
||||||
|
+ gsize output_size;
|
||||||
|
+ gsize bytes_read;
|
||||||
|
+
|
||||||
|
+ bytes_read = read (fd, &output_size, sizeof (output_size));
|
||||||
|
+
|
||||||
|
+ if (bytes_read < sizeof (output_size))
|
||||||
|
+ exit (1);
|
||||||
|
+
|
||||||
|
+ output = g_malloc0 (output_size);
|
||||||
|
+ bytes_read = read (fd, output, output_size);
|
||||||
|
+
|
||||||
|
+ if (bytes_read < output_size)
|
||||||
|
+ exit (1);
|
||||||
|
+
|
||||||
|
+ printf ("%s\n", output);
|
||||||
|
+ fflush (stdout);
|
||||||
|
+ g_free (output);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static void
|
||||||
|
+send_environment_and_finish_parent (int fd)
|
||||||
|
+{
|
||||||
|
+ char *output;
|
||||||
|
+ gsize output_size;
|
||||||
|
+ gsize bytes_written;
|
||||||
|
+
|
||||||
|
+ if (fd < 0) {
|
||||||
|
+ print_environment ();
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ output = g_strjoinv ("\n", (gchar **) gkd_util_get_environment ());
|
||||||
|
+ output_size = strlen (output) + 1;
|
||||||
|
+ bytes_written = write (fd, &output_size, sizeof (output_size));
|
||||||
|
+
|
||||||
|
+ if (bytes_written < sizeof (output_size))
|
||||||
|
+ exit (1);
|
||||||
|
+
|
||||||
|
+ bytes_written = write (fd, output, output_size);
|
||||||
|
+ if (bytes_written < output_size)
|
||||||
|
+ exit (1);
|
||||||
|
+
|
||||||
|
+ g_free (output);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
static gboolean
|
||||||
|
initialize_daemon_at (const gchar *directory)
|
||||||
|
{
|
||||||
|
gchar **ourenv, **daemonenv, **e;
|
||||||
|
|
||||||
|
/* Exchange environment variables, and try to initialize daemon */
|
||||||
|
ourenv = gkd_util_build_environment (GKD_UTIL_IN_ENVIRONMENT);
|
||||||
|
daemonenv = gkd_control_initialize (directory, run_components,
|
||||||
|
(const gchar**)ourenv);
|
||||||
|
g_strfreev (ourenv);
|
||||||
|
|
||||||
|
/* Initialization failed, start this process up as a daemon */
|
||||||
|
if (!daemonenv)
|
||||||
|
return FALSE;
|
||||||
|
|
||||||
|
/* Setup all the environment variables we were passed */
|
||||||
|
for (e = daemonenv; *e; ++e)
|
||||||
|
gkd_util_push_environment_full (*e);
|
||||||
|
g_strfreev (daemonenv);
|
||||||
|
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
static gboolean
|
||||||
|
replace_daemon_at (const gchar *directory)
|
||||||
|
{
|
||||||
|
gboolean ret;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The first control_directory is the environment one, always
|
||||||
|
@@ -577,136 +628,134 @@ discover_other_daemon (DiscoverFunc callback, gboolean acquire)
|
||||||
|
|
||||||
|
/* Or the default location when no evironment variable */
|
||||||
|
control_env = g_getenv ("XDG_RUNTIME_DIR");
|
||||||
|
if (control_env) {
|
||||||
|
control = g_build_filename (control_env, "keyring", NULL);
|
||||||
|
ret = (callback) (control);
|
||||||
|
g_free (control);
|
||||||
|
if (ret == TRUE)
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* See if we can contact a daemon running, that didn't set an env variable */
|
||||||
|
if (acquire && !gkd_dbus_singleton_acquire (&acquired))
|
||||||
|
return FALSE;
|
||||||
|
|
||||||
|
/* We're the main daemon */
|
||||||
|
if (acquired)
|
||||||
|
return FALSE;
|
||||||
|
|
||||||
|
control = gkd_dbus_singleton_control ();
|
||||||
|
if (control) {
|
||||||
|
ret = (callback) (control);
|
||||||
|
g_free (control);
|
||||||
|
if (ret == TRUE)
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
-static void
|
||||||
|
+static int
|
||||||
|
fork_and_print_environment (void)
|
||||||
|
{
|
||||||
|
int status;
|
||||||
|
pid_t pid;
|
||||||
|
int fd, i;
|
||||||
|
+ int wakeup_fds[2] = { -1, -1 };
|
||||||
|
|
||||||
|
- if (run_foreground) {
|
||||||
|
- print_environment ();
|
||||||
|
- return;
|
||||||
|
- }
|
||||||
|
+ g_unix_open_pipe (wakeup_fds, FD_CLOEXEC, NULL);
|
||||||
|
|
||||||
|
pid = fork ();
|
||||||
|
|
||||||
|
if (pid != 0) {
|
||||||
|
-
|
||||||
|
/* Here we are in the initial process */
|
||||||
|
|
||||||
|
if (run_daemonized) {
|
||||||
|
|
||||||
|
/* Initial process, waits for intermediate child */
|
||||||
|
if (pid == -1)
|
||||||
|
exit (1);
|
||||||
|
|
||||||
|
waitpid (pid, &status, 0);
|
||||||
|
if (WEXITSTATUS (status) != 0)
|
||||||
|
exit (WEXITSTATUS (status));
|
||||||
|
|
||||||
|
} else {
|
||||||
|
/* Not double forking */
|
||||||
|
- print_environment ();
|
||||||
|
+ print_environment_from_fd (wakeup_fds[0]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* The initial process exits successfully */
|
||||||
|
exit (0);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (run_daemonized) {
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Become session leader of a new session, process group leader of a new
|
||||||
|
* process group, and detach from the controlling TTY, so that SIGHUP is
|
||||||
|
* not sent to this process when the previous session leader dies
|
||||||
|
*/
|
||||||
|
setsid ();
|
||||||
|
|
||||||
|
/* Double fork if need to daemonize properly */
|
||||||
|
pid = fork ();
|
||||||
|
|
||||||
|
if (pid != 0) {
|
||||||
|
-
|
||||||
|
/* Here we are in the intermediate child process */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This process exits, so that the final child will inherit
|
||||||
|
* init as parent to avoid zombies
|
||||||
|
*/
|
||||||
|
if (pid == -1)
|
||||||
|
exit (1);
|
||||||
|
|
||||||
|
/* We've done two forks. */
|
||||||
|
- print_environment ();
|
||||||
|
+ print_environment_from_fd (wakeup_fds[0]);
|
||||||
|
|
||||||
|
/* The intermediate child exits */
|
||||||
|
exit (0);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Here we are in the resulting daemon or background process. */
|
||||||
|
|
||||||
|
for (i = 0; i < 3; ++i) {
|
||||||
|
fd = open ("/dev/null", O_RDONLY);
|
||||||
|
sane_dup2 (fd, i);
|
||||||
|
close (fd);
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+ return wakeup_fds[1];
|
||||||
|
}
|
||||||
|
|
||||||
|
static gboolean
|
||||||
|
gkr_daemon_startup_steps (const gchar *components)
|
||||||
|
{
|
||||||
|
g_assert (components);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Startup that must run before forking.
|
||||||
|
* Note that we set initialized flags early so that two
|
||||||
|
* initializations don't overlap
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifdef WITH_SSH
|
||||||
|
if (strstr (components, GKD_COMP_SSH)) {
|
||||||
|
if (ssh_started) {
|
||||||
|
g_message ("The SSH agent was already initialized");
|
||||||
|
} else {
|
||||||
|
ssh_started = TRUE;
|
||||||
|
if (!gkd_daemon_startup_ssh ()) {
|
||||||
|
ssh_started = FALSE;
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -849,112 +898,114 @@ main (int argc, char *argv[])
|
||||||
|
#ifdef HAVE_LOCALE_H
|
||||||
|
/* internationalisation */
|
||||||
|
setlocale (LC_ALL, "");
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifdef HAVE_GETTEXT
|
||||||
|
bindtextdomain (GETTEXT_PACKAGE, GNOMELOCALEDIR);
|
||||||
|
textdomain (GETTEXT_PACKAGE);
|
||||||
|
bind_textdomain_codeset (GETTEXT_PACKAGE, "UTF-8");
|
||||||
|
#endif
|
||||||
|
|
||||||
|
egg_libgcrypt_initialize ();
|
||||||
|
|
||||||
|
/* Send all warning or error messages to syslog */
|
||||||
|
prepare_logging ();
|
||||||
|
|
||||||
|
parse_arguments (&argc, &argv);
|
||||||
|
|
||||||
|
/* The --version option. This is machine parseable output */
|
||||||
|
if (run_version) {
|
||||||
|
g_print ("gnome-keyring-daemon: %s\n", VERSION);
|
||||||
|
g_print ("testing: %s\n",
|
||||||
|
#ifdef WITH_DEBUG
|
||||||
|
"enabled");
|
||||||
|
#else
|
||||||
|
"disabled");
|
||||||
|
#endif
|
||||||
|
exit (0);
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /* The whole forking and daemonizing dance starts here. */
|
||||||
|
+ parent_wakeup_fd = fork_and_print_environment();
|
||||||
|
+
|
||||||
|
/* The --start option */
|
||||||
|
if (run_for_start) {
|
||||||
|
if (discover_other_daemon (initialize_daemon_at, TRUE)) {
|
||||||
|
/*
|
||||||
|
* Another daemon was initialized, print out environment
|
||||||
|
* for any callers, and quit or go comatose.
|
||||||
|
*/
|
||||||
|
- print_environment ();
|
||||||
|
+ send_environment_and_finish_parent (parent_wakeup_fd);
|
||||||
|
if (run_foreground)
|
||||||
|
while (sleep(0x08000000) == 0);
|
||||||
|
cleanup_and_exit (0);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* The --replace option */
|
||||||
|
} else if (run_for_replace) {
|
||||||
|
discover_other_daemon (replace_daemon_at, FALSE);
|
||||||
|
if (control_directory)
|
||||||
|
g_message ("Replacing daemon, using directory: %s", control_directory);
|
||||||
|
else
|
||||||
|
g_message ("Could not find daemon to replace, staring normally");
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Initialize the main directory */
|
||||||
|
gkd_util_init_master_directory (control_directory);
|
||||||
|
|
||||||
|
/* Initialize our daemon main loop and threading */
|
||||||
|
loop = g_main_loop_new (NULL, FALSE);
|
||||||
|
|
||||||
|
/* Initialize our control socket */
|
||||||
|
if (!gkd_control_listen ())
|
||||||
|
return FALSE;
|
||||||
|
|
||||||
|
if (perform_unlock) {
|
||||||
|
login_password = read_login_password (STDIN);
|
||||||
|
atexit (clear_login_password);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* The --login option. Delayed initialization */
|
||||||
|
if (run_for_login) {
|
||||||
|
timeout_id = g_timeout_add_seconds (LOGIN_TIMEOUT, (GSourceFunc) on_login_timeout, NULL);
|
||||||
|
|
||||||
|
/* Not a login daemon. Startup stuff now.*/
|
||||||
|
} else {
|
||||||
|
/* These are things that can run before forking */
|
||||||
|
if (!gkr_daemon_startup_steps (run_components))
|
||||||
|
cleanup_and_exit (1);
|
||||||
|
}
|
||||||
|
|
||||||
|
signal (SIGPIPE, SIG_IGN);
|
||||||
|
|
||||||
|
- /* The whole forking and daemonizing dance starts here. */
|
||||||
|
- fork_and_print_environment();
|
||||||
|
+ send_environment_and_finish_parent (parent_wakeup_fd);
|
||||||
|
|
||||||
|
g_unix_signal_add (SIGTERM, on_signal_term, loop);
|
||||||
|
g_unix_signal_add (SIGHUP, on_signal_term, loop);
|
||||||
|
g_unix_signal_add (SIGUSR1, on_signal_usr1, loop);
|
||||||
|
|
||||||
|
/* Prepare logging a second time, since we may be in a different process */
|
||||||
|
prepare_logging();
|
||||||
|
|
||||||
|
/* Remainder initialization after forking, if initialization not delayed */
|
||||||
|
if (!run_for_login) {
|
||||||
|
gkr_daemon_initialize_steps (run_components);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Close stdout and so that the caller knows that we're
|
||||||
|
* all initialized, (when run in foreground mode).
|
||||||
|
*
|
||||||
|
* However since some logging goes to stdout, redirect that
|
||||||
|
* to stderr. We don't want the caller confusing that with
|
||||||
|
* valid output anyway.
|
||||||
|
*/
|
||||||
|
if (dup2 (2, 1) < 1)
|
||||||
|
g_warning ("couldn't redirect stdout to stderr");
|
||||||
|
|
||||||
|
g_debug ("initialization complete");
|
||||||
|
}
|
||||||
|
|
||||||
|
g_main_loop_run (loop);
|
||||||
|
|
||||||
|
/* This wraps everything up in order */
|
||||||
|
egg_cleanup_perform ();
|
||||||
|
--
|
||||||
|
2.5.0
|
||||||
|
|
@ -6,12 +6,13 @@
|
|||||||
Summary: Framework for managing passwords and other secrets
|
Summary: Framework for managing passwords and other secrets
|
||||||
Name: gnome-keyring
|
Name: gnome-keyring
|
||||||
Version: 3.18.0
|
Version: 3.18.0
|
||||||
Release: 2%{?dist}
|
Release: 3%{?dist}
|
||||||
License: GPLv2+ and LGPLv2+
|
License: GPLv2+ and LGPLv2+
|
||||||
Group: System Environment/Libraries
|
Group: System Environment/Libraries
|
||||||
#VCS: git:git://git.gnome.org/gnome-keyring
|
#VCS: git:git://git.gnome.org/gnome-keyring
|
||||||
Source: https://download.gnome.org/sources/%{name}/3.15/%{name}-%{version}.tar.xz
|
Source: https://download.gnome.org/sources/%{name}/3.15/%{name}-%{version}.tar.xz
|
||||||
Patch0: 0001-dbus-Initialize-secret-service-before-claiming-name.patch
|
Patch0: 0001-dbus-Initialize-secret-service-before-claiming-name.patch
|
||||||
|
Patch1: fix-autologin.patch
|
||||||
URL: https://wiki.gnome.org/Projects/GnomeKeyring
|
URL: https://wiki.gnome.org/Projects/GnomeKeyring
|
||||||
|
|
||||||
BuildRequires: pkgconfig(dbus-1) >= %{dbus_version}
|
BuildRequires: pkgconfig(dbus-1) >= %{dbus_version}
|
||||||
@ -53,6 +54,7 @@ automatically unlock the "login" keyring when the user logs in.
|
|||||||
%prep
|
%prep
|
||||||
%setup -q -n gnome-keyring-%{version}
|
%setup -q -n gnome-keyring-%{version}
|
||||||
%patch0 -p1
|
%patch0 -p1
|
||||||
|
%patch1 -p1
|
||||||
|
|
||||||
%build
|
%build
|
||||||
%configure \
|
%configure \
|
||||||
@ -70,6 +72,7 @@ make install DESTDIR=$RPM_BUILD_ROOT INSTALL="install -p"
|
|||||||
rm $RPM_BUILD_ROOT%{_libdir}/security/*.la
|
rm $RPM_BUILD_ROOT%{_libdir}/security/*.la
|
||||||
rm $RPM_BUILD_ROOT%{_libdir}/pkcs11/*.la
|
rm $RPM_BUILD_ROOT%{_libdir}/pkcs11/*.la
|
||||||
rm $RPM_BUILD_ROOT%{_libdir}/gnome-keyring/devel/*.la
|
rm $RPM_BUILD_ROOT%{_libdir}/gnome-keyring/devel/*.la
|
||||||
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/xdg/autostart/gnome-keyring-secrets.desktop
|
||||||
|
|
||||||
%find_lang gnome-keyring
|
%find_lang gnome-keyring
|
||||||
|
|
||||||
@ -109,6 +112,10 @@ glib-compile-schemas %{_datadir}/glib-2.0/schemas >&/dev/null || :
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Oct 15 2015 Ray Strode <rstrode@redhat.com> 3.18.0-3
|
||||||
|
- Fix deadlock in gnome-keyring when using autologin
|
||||||
|
Resolves: #1269581
|
||||||
|
|
||||||
* Wed Oct 14 2015 Kalev Lember <klember@redhat.com> - 3.18.0-2
|
* Wed Oct 14 2015 Kalev Lember <klember@redhat.com> - 3.18.0-2
|
||||||
- dbus: Initialize secret service before claiming name
|
- dbus: Initialize secret service before claiming name
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user