mkdir -p './fish/completions'
mkdir -p './glvnd/egl_vendor.d'
mkdir -p './grokevt/systems'
-mkdir -p './guest-session'
mkdir -p './initramfs-tools/hooks'
mkdir -p './initramfs-tools/scripts/init-bottom'
mkdir -p './initramfs-tools/scripts/init-premount'
mkdir -p './insserv/overrides'
mkdir -p './kernel/install.d'
mkdir -p './libpaper.d'
-mkdir -p './lightdm/lightdm.conf.d'
mkdir -p './netplan'
mkdir -p './network/interfaces.d'
mkdir -p './networkd-dispatcher/dormant.d'
maybe chmod 0644 'apparmor.d/abstractions/launchpad-integration'
maybe chmod 0644 'apparmor.d/abstractions/ldapclient'
maybe chmod 0644 'apparmor.d/abstractions/libpam-systemd'
-maybe chmod 0644 'apparmor.d/abstractions/lightdm'
-maybe chmod 0644 'apparmor.d/abstractions/lightdm_chromium-browser'
maybe chmod 0644 'apparmor.d/abstractions/likewise'
maybe chmod 0644 'apparmor.d/abstractions/mdns'
maybe chmod 0644 'apparmor.d/abstractions/mir'
maybe chmod 0755 'apparmor.d/cache'
maybe chmod 0755 'apparmor.d/disable'
maybe chmod 0755 'apparmor.d/force-complain'
-maybe chmod 0644 'apparmor.d/lightdm-guest-session'
maybe chmod 0755 'apparmor.d/local'
maybe chmod 0644 'apparmor.d/local/README'
maybe chmod 0644 'apparmor.d/local/sbin.dhclient'
maybe chmod 0644 'dbus-1/system.d/org.debian.apt.conf'
maybe chmod 0644 'dbus-1/system.d/org.freedesktop.Accounts.conf'
maybe chmod 0644 'dbus-1/system.d/org.freedesktop.ColorManager.conf'
-maybe chmod 0644 'dbus-1/system.d/org.freedesktop.DisplayManager.conf'
maybe chmod 0644 'dbus-1/system.d/org.freedesktop.GeoClue2.Agent.conf'
maybe chmod 0644 'dbus-1/system.d/org.freedesktop.GeoClue2.conf'
maybe chmod 0644 'dbus-1/system.d/org.freedesktop.ModemManager1.conf'
maybe chmod 0755 'gtk-3.0'
maybe chmod 0644 'gtk-3.0/im-multipress.conf'
maybe chmod 0755 'gtk-3.0/settings.ini'
-maybe chmod 0755 'guest-session'
maybe chmod 0755 'guymager'
maybe chmod 0644 'guymager/guymager.cfg'
maybe chmod 0644 'hdparm.conf'
maybe chmod 0755 'init.d/keyboard-setup.sh'
maybe chmod 0755 'init.d/killprocs'
maybe chmod 0755 'init.d/kmod'
-maybe chmod 0755 'init.d/lightdm'
maybe chmod 0755 'init.d/lm-sensors'
maybe chmod 0755 'init.d/lvm2'
maybe chmod 0755 'init.d/lvm2-lvmetad'
maybe chmod 0644 'init/gpu-manager.conf'
maybe chmod 0644 'init/hostname.conf'
maybe chmod 0644 'init/hostname.sh.conf'
-maybe chmod 0644 'init/lightdm.conf'
maybe chmod 0644 'init/mongodb.conf'
maybe chmod 0644 'init/mountall-bootclean.sh.conf'
maybe chmod 0644 'init/mountall-net.conf'
maybe chmod 0644 'libreoffice/sofficerc'
maybe chmod 0755 'lightdm'
maybe chmod 0664 'lightdm/lightdm.conf'
-maybe chmod 0755 'lightdm/lightdm.conf.d'
-maybe chmod 0644 'lightdm/users.conf'
maybe chmod 0755 'lighttpd'
maybe chmod 0755 'lighttpd/conf-available'
maybe chmod 0644 'lighttpd/conf-available/90-javascript-alias.conf'
maybe chmod 0644 'logrotate.d/cups-daemon'
maybe chmod 0644 'logrotate.d/dpkg'
maybe chmod 0644 'logrotate.d/iptraf-ng'
-maybe chmod 0644 'logrotate.d/lightdm'
maybe chmod 0644 'logrotate.d/mongodb-server'
maybe chmod 0644 'logrotate.d/mysql-server'
maybe chmod 0644 'logrotate.d/pm-utils'
maybe chmod 0644 'pam.d/gdm-launch-environment'
maybe chmod 0644 'pam.d/gdm-password'
maybe chmod 0644 'pam.d/gnome-screensaver'
-maybe chmod 0644 'pam.d/lightdm'
-maybe chmod 0644 'pam.d/lightdm-autologin'
-maybe chmod 0644 'pam.d/lightdm-greeter'
maybe chmod 0644 'pam.d/login'
maybe chmod 0644 'pam.d/newusers'
maybe chmod 0644 'pam.d/other'
-/usr/sbin/lightdm
+/usr/sbin/gdm3
+++ /dev/null
-# vim:syntax=apparmor
-# Profile for restricting lightdm guest session
-# Author: Martin Pitt <martin.pitt@ubuntu.com>
-
-# This abstraction provides the majority of the confinement for guest sessions.
-# It is in its own abstraction so we can have a centralized place for
-# confinement for the various lightdm sessions (guest, freerdp, uccsconfigure,
-# etc). Note that this profile intentionally omits chromium-browser.
-
-# Requires apparmor 2.9
-
- #include <abstractions/authentication>
- #include <abstractions/cups-client>
- #include <abstractions/dbus>
- #include <abstractions/dbus-session>
- #include <abstractions/dbus-accessibility>
- #include <abstractions/nameservice>
- #include <abstractions/wutmp>
-
- # bug in compiz https://launchpad.net/bugs/697678
- /etc/compizconfig/config rw,
- /etc/compizconfig/unity.ini rw,
-
- / r,
- /bin/ rmix,
- /bin/fusermount Px,
- /bin/** rmix,
- /cdrom/ rmix,
- /cdrom/** rmix,
- /dev/ r,
- /dev/** rmw, # audio devices etc.
- owner /dev/shm/** rmw,
- /etc/ r,
- /etc/** rmk,
- /etc/gdm/Xsession ix,
- /etc/X11/xdm/** ix, # needed for openSUSE's default session-wrapper
- /etc/X11/xinit/** ix, # needed for openSUSE's default session-wrapper
- /lib/ r,
- /lib/** rmixk,
- /lib32/ r,
- /lib32/** rmixk,
- /lib64/ r,
- /lib64/** rmixk,
- owner /{,run/}media/ r,
- owner /{,run/}media/** rmwlixk, # we want access to USB sticks and the like
- /opt/ r,
- /opt/** rmixk,
- @{PROC}/ r,
- @{PROC}/* rm,
- @{PROC}/[0-9]*/net/ r,
- @{PROC}/[0-9]*/net/dev r,
- @{PROC}/asound rm,
- @{PROC}/asound/** rm,
- @{PROC}/ati rm,
- @{PROC}/ati/** rm,
- @{PROC}/sys/vm/overcommit_memory r,
- owner @{PROC}/** rm,
- # needed for gnome-keyring-daemon
- @{PROC}/*/status r,
- # needed for bamfdaemon and utilities such as ps and killall
- @{PROC}/*/stat r,
- /sbin/ r,
- /sbin/** rmixk,
- /sys/ r,
- /sys/** rm,
- # needed for confined trusted helpers, such as dbus-daemon
- /sys/kernel/security/apparmor/.access rw,
- /tmp/ rw,
- owner /tmp/** rwlkmix,
- /usr/ r,
- /usr/** rmixk,
- /var/ r,
- /var/** rmixk,
- /var/guest-data/** rw, # allow to store files permanently
- /var/tmp/ rw,
- owner /var/tmp/** rwlkm,
- /{,var/}run/ r,
- # necessary for writing to sockets, etc.
- /{,var/}run/** rmkix,
- /{,var/}run/mir_socket rw,
- /{,var/}run/screen/** wl,
- /{,var/}run/shm/** wl,
- /{,var/}run/uuidd/request w,
- # libpam-xdg-support/logind
- owner /{,var/}run/user/*/** rw,
-
- capability ipc_lock,
-
- # allow processes in the guest session to signal and ptrace each other
- signal peer=@{profile_name},
- ptrace peer=@{profile_name},
- # needed when logging out of the guest session
- signal (receive) peer=unconfined,
-
- unix peer=(label=@{profile_name}),
- unix (receive) peer=(label=unconfined),
- unix (create),
- unix (getattr, getopt, setopt, shutdown),
- unix (bind, listen, accept, receive, send) type=stream addr="@/com/ubuntu/upstart-session/**",
- unix (bind, listen) type=stream addr="@/tmp/dbus-*",
- unix (bind, listen) type=stream addr="@/tmp/.ICE-unix/[0-9]*",
- unix (bind, listen) type=stream addr="@/dbus-vfs-daemon/*",
- unix (bind, listen) type=stream addr="@guest*",
- unix (connect, receive, send) type=stream peer=(addr="@/tmp/dbus-*"),
- unix (connect, receive, send) type=stream peer=(addr="@/tmp/.X11-unix/X[0-9]*"),
- unix (connect, receive, send) type=stream peer=(addr="@/dbus-vfs-daemon/*"),
- unix (connect, receive, send) type=stream peer=(addr="@guest*"),
-
- # silence warnings for stuff that we really don't want to grant
- deny capability dac_override,
- deny capability dac_read_search,
- #deny /etc/** w, # re-enable once LP#697678 is fixed
- deny /usr/** w,
- deny /var/crash/ w,
+++ /dev/null
-# vim:syntax=apparmor
-# Profile abstraction for restricting chromium in the lightdm guest session
-# Author: Jamie Strandboge <jamie@canonical.com>
-
-# The abstraction provides the additional accesses required to launch
-# chromium based browsers from within an lightdm session. Because AppArmor
-# cannot yet merge profiles and because we want to utilize the access rules
-# provided in abstractions/lightdm, this abstraction must be separate from
-# abstractions/lightdm.
-
-# Requires apparmor 2.9
-
- /usr/lib/chromium-browser/chromium-browser Cx -> chromium,
- /usr/bin/webapp-container Cx -> chromium,
- /usr/bin/webbrowser-app Cx -> chromium,
- /usr/bin/ubuntu-html5-app-launcher Cx -> chromium,
- /opt/google/chrome-stable/google-chrome-stable Cx -> chromium,
- /opt/google/chrome-beta/google-chrome-beta Cx -> chromium,
- /opt/google/chrome-unstable/google-chrome-unstable Cx -> chromium,
- /opt/google/chrome/google-chrome Cx -> chromium,
-
- # Allow ptracing processes in the chromium child profile
- ptrace peer=/usr/lib/lightdm/lightdm-guest-session//chromium,
-
- # Allow receiving and sending signals to processes in the chromium child profile
- signal (receive, send) peer=/usr/lib/lightdm/lightdm-guest-session//chromium,
-
- # Allow communications with chromium child profile via unix sockets
- unix peer=(label=/usr/lib/lightdm/lightdm-guest-session//chromium),
-
- profile chromium {
- # Allow all the same accesses as other applications in the guest session
- #include <abstractions/lightdm>
-
- # but also allow a few things because of chromium-browser's sandboxing that
- # are not appropriate to other guest session applications.
- owner @{PROC}/[0-9]*/oom_{,score_}adj w,
- @{PROC}/sys/kernel/shmmax r,
- capability sys_admin, # for sandbox to change namespaces
- capability sys_chroot, # fod sandbox to chroot to a safe directory
- capability setgid, # for sandbox to drop privileges
- capability setuid, # for sandbox to drop privileges
- capability sys_ptrace, # chromium needs this to keep track of itself
- @{PROC}/sys/kernel/yama/ptrace_scope r,
-
- # Allow ptrace reads of processes in the lightdm-guest-session
- ptrace (read) peer=/usr/lib/lightdm/lightdm-guest-session,
- # Allow other guest session processes to read and trace us
- ptrace (readby, tracedby) peer=/usr/lib/lightdm/lightdm-guest-session,
- ptrace (readby, tracedby) peer=@{profile_name},
-
- # Allow us to receive and send signals from processes in the
- # lightdm-guest-session
- signal (receive, send) set=("exists", "term") peer=/usr/lib/lightdm/lightdm-guest-session,
-
- # Allow us to receive and send on unix sockets from processes in the
- # lightdm-guest-session
- unix (receive, send) peer=(label=/usr/lib/lightdm/lightdm-guest-session),
-
- @{PROC}/[0-9]*/ r, # sandbox wants these
- @{PROC}/[0-9]*/fd/ r, # sandbox wants these
- @{PROC}/[0-9]*/statm r, # sandbox wants these
- @{PROC}/[0-9]*/task/[0-9]*/stat r, # sandbox wants these
-
- owner @{PROC}/@{pid}/setgroups w,
- owner @{PROC}/@{pid}/uid_map w,
- owner @{PROC}/@{pid}/gid_map w,
-
- /selinux/ r,
-
- /usr/lib/chromium-browser/chromium-browser-sandbox ix,
- /usr/lib/@{multiarch}/oxide-qt/chrome-sandbox ix,
- /opt/google/chrome-*/chrome-sandbox ix,
- }
+++ /dev/null
-# vim:syntax=apparmor
-# Profile for restricting lightdm guest session
-
-#include <tunables/global>
-
-/usr/lib/lightdm/lightdm-guest-session {
- # Most applications are confined via the main abstraction
- #include <abstractions/lightdm>
-
- # chromium-browser needs special confinement due to its sandboxing
- #include <abstractions/lightdm_chromium-browser>
-
- # fcitx and friends needs special treatment due to C/S design
- /usr/bin/fcitx ix,
- /tmp/fcitx-socket-* rwl,
- /dev/shm/* rwl,
- /usr/bin/fcitx-qimpanel ix,
- /usr/bin/sogou-qimpanel-watchdog ix,
- /usr/bin/sogou-sys-notify ix,
- /tmp/sogou-qimpanel:* rwl,
-
- # Allow ibus
- unix (bind, listen) type=stream addr="@tmp/ibus/*",
-
- # mozc_server needs special treatment due to C/S design
- unix (bind, listen) type=stream addr="@tmp/.mozc.*",
-}
+++ /dev/null
-<!DOCTYPE busconfig PUBLIC
- "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
- "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
-<busconfig>
-
- <!-- Only root can own the service -->
- <policy user="root">
- <allow own="org.freedesktop.DisplayManager"/>
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DisplayManager" send_member="AddSeat"/>
- </policy>
-
- <policy context="default">
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DBus.Properties"/>
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DBus.Introspectable"/>
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DisplayManager"/>
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DisplayManager.Seat"/>
- <allow send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DisplayManager.Session"/>
- <deny send_destination="org.freedesktop.DisplayManager" send_interface="org.freedesktop.DisplayManager" send_member="AddSeat"/>
- </policy>
-
-</busconfig>
+++ /dev/null
-#!/bin/sh
-
-# Largely adapted from xdm's init script:
-# Copyright 1998-2002, 2004, 2005 Branden Robinson <branden@debian.org>.
-# Copyright 2006 Eugene Konev <ejka@imfi.kspu.ru>
-#
-# This is free software; you may redistribute it and/or modify
-# it under the terms of the GNU General Public License as
-# published by the Free Software Foundation; either version 2,
-# or (at your option) any later version.
-#
-# This is distributed in the hope that it will be useful, but
-# WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License with
-# the Debian operating system, in /usr/share/common-licenses/GPL; if
-# not, write to the Free Software Foundation, Inc., 51 Franklin Street,
-# Fifth Floor, Boston, MA 02110-1301, USA.
-
-### BEGIN INIT INFO
-# Provides: lightdm
-# Required-Start: $local_fs $remote_fs dbus
-# Required-Stop: $local_fs $remote_fs dbus
-# Should-Start: $named
-# Should-Stop: $named
-# Default-Start: 2 3 4 5
-# Default-Stop: 0 1 6
-# Short-Description: Start lightdm
-### END INIT INFO
-
-set -e
-
-HEED_DEFAULT_DISPLAY_MANAGER=
-# To start lightdm even if it is not the default display manager, change
-# HEED_DEFAULT_DISPLAY_MANAGER to "false."
-# Also overridable from command line like:
-# HEED_DEFAULT_DISPLAY_MANAGER=false /etc/init.d/lightdm start
-[ -z "$HEED_DEFAULT_DISPLAY_MANAGER" ] && HEED_DEFAULT_DISPLAY_MANAGER=true
-
-DEFAULT_DISPLAY_MANAGER_FILE=/etc/X11/default-display-manager
-
-PATH=/bin:/usr/bin:/sbin:/usr/sbin
-DAEMON=/usr/sbin/lightdm
-PIDFILE=/var/run/lightdm.pid
-
-if [ -r /etc/default/locale ]; then
- . /etc/default/locale
- export LANG LANGUAGE
-fi
-
-test -x $DAEMON || exit 0
-
-. /lib/lsb/init-functions
-
-SSD_START_ARGS="--pidfile $PIDFILE --name $(basename $DAEMON) --startas $DAEMON -- -d"
-SSD_STOP_ARGS="--pidfile $PIDFILE --name $(basename $DAEMON) --retry TERM/5/TERM/5"
-
-case "$1" in
- start)
- if [ "$HEED_DEFAULT_DISPLAY_MANAGER" = "true" ] &&
- [ -e $DEFAULT_DISPLAY_MANAGER_FILE ] &&
- [ "$(cat $DEFAULT_DISPLAY_MANAGER_FILE)" != "/usr/bin/lightdm" -a "$(cat $DEFAULT_DISPLAY_MANAGER_FILE)" != "/usr/sbin/lightdm" ]; then
- echo "Not starting X display manager (lightdm); it is not the default" \
- "display manager."
- else
- log_daemon_msg "Starting X display manager" "lightdm"
- start-stop-daemon --start --quiet $SSD_START_ARGS \
- || log_progress_msg "already running"
- log_end_msg 0
- fi
- ;;
-
- restart)
- [ -f $PIDFILE ] && /etc/init.d/lightdm stop
- [ -f $PIDFILE ] && exit 1
- /etc/init.d/lightdm start
- ;;
-
- stop)
- log_daemon_msg "Stopping X display manager" "lightdm"
- if ! [ -f $PIDFILE ]; then
- log_progress_msg "not running ($PIDFILE not found)"
- else
- start-stop-daemon --stop --quiet $SSD_STOP_ARGS
- SSD_RES=$?
- if [ $SSD_RES -eq 1 ]; then
- log_progress_msg "not running"
- fi
- if [ $SSD_RES -eq 2 ]; then
- log_progress_msg "not responding to TERM signals"
- else
- if [ -f $PIDFILE ]; then
- log_progress_msg "(removing stale $PIDFILE)"
- rm $PIDFILE
- fi
- fi
- fi
- log_end_msg 0
- ;;
- force-reload)
- /etc/init.d/lightdm restart
- ;;
-
- *)
- echo "Usage: /etc/init.d/lightdm {start|stop|restart|force-reload}"
- exit 1
- ;;
-esac
-
-exit 0
+++ /dev/null
-# LightDM - light Display Manager
-#
-# The display manager service manages the X servers running on the
-# system, providing login and auto-login services
-#
-# based on gdm upstart script
-
-description "LightDM Display Manager"
-author "Robert Ancell <robert.ancell@canonical.com>"
-
-start on ((filesystem
- and runlevel [!06]
- and started dbus
- and plymouth-ready)
- or runlevel PREVLEVEL=S)
-
-stop on runlevel [016]
-
-respawn
-respawn limit 2 15
-
-emits login-session-start
-emits desktop-session-start
-emits desktop-shutdown
-
-script
- if [ -n "$UPSTART_EVENTS" ]
- then
- # Check kernel command-line for inhibitors, unless we are being called
- # manually
- for ARG in $(cat /proc/cmdline); do
- if [ "$ARG" = "text" ]; then
- plymouth quit || :
- stop
- exit 0
- fi
- done
-
- [ ! -f /etc/X11/default-display-manager -o "$(cat /etc/X11/default-display-manager 2>/dev/null)" = "/usr/bin/lightdm" -o "$(cat /etc/X11/default-display-manager 2>/dev/null)" = "/usr/sbin/lightdm" ] || { stop; exit 0; }
-
- if [ "$RUNLEVEL" = S -o "$RUNLEVEL" = 1 ]
- then
- # Single-user mode
- plymouth quit || :
- exit 0
- fi
- fi
-
- exec lightdm
-end script
-
-post-start script
- sleep 5
- clear > /dev/tty7
-end script
-
-post-stop script
- clear > /dev/tty7
- sleep 1
- if [ "$UPSTART_STOP_EVENTS" = runlevel ]; then
- initctl emit desktop-shutdown
- fi
-end script
+++ /dev/null
-#
-# User accounts configuration
-#
-# NOTE: If you have AccountsService installed on your system, then LightDM will
-# use this instead and these settings will be ignored
-#
-# minimum-uid = Minimum UID required to be shown in greeter
-# hidden-users = Users that are not shown to the user
-# hidden-shells = Shells that indicate a user cannot login
-#
-[UserList]
-minimum-uid=500
-hidden-users=nobody nobody4 noaccess
-hidden-shells=/bin/false /usr/sbin/nologin
+++ /dev/null
-/var/log/lightdm/*.log {
- daily
- missingok
- rotate 7
- compress
- notifempty
- maxsize 10M
- copytruncate
-}
+++ /dev/null
-#%PAM-1.0
-auth requisite pam_nologin.so
-auth sufficient pam_succeed_if.so user ingroup nopasswdlogin
-@include common-auth
-auth optional pam_gnome_keyring.so
-auth optional pam_kwallet.so
-auth optional pam_kwallet5.so
-@include common-account
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
-#session required pam_loginuid.so
-session required pam_limits.so
-@include common-session
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
-session optional pam_gnome_keyring.so auto_start
-session optional pam_kwallet.so auto_start
-session optional pam_kwallet5.so auto_start
-session required pam_env.so readenv=1
-session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
-@include common-password
+++ /dev/null
-#%PAM-1.0
-auth requisite pam_nologin.so
-auth required pam_permit.so
-@include common-account
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
-#session required pam_loginuid.so
-session required pam_limits.so
-@include common-session
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
-session required pam_env.so readenv=1
-session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
-@include common-password
+++ /dev/null
-#%PAM-1.0
-auth required pam_permit.so
-auth optional pam_gnome_keyring.so
-auth optional pam_kwallet.so
-auth optional pam_kwallet5.so
-@include common-account
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
-session required pam_limits.so
-@include common-session
-session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
-session optional pam_gnome_keyring.so auto_start
-session optional pam_kwallet.so auto_start
-session optional pam_kwallet5.so auto_start
-session required pam_env.so readenv=1
-session required pam_env.so readenv=1 user_readenv=1 envfile=/etc/default/locale
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file
+++ /dev/null
-../init.d/lightdm
\ No newline at end of file