mirror of
https://gitlab.freedesktop.org/libfprint/fprintd.git
synced 2026-02-07 06:20:27 +01:00
If the directory referred to by ReadWritePaths= does not exist, the
service fails to start:
systemd[1]: Starting Fingerprint Authentication Daemon...
systemd[9736]: fprintd.service: Failed to set up mount namespacing: No such file or directory
systemd[9736]: fprintd.service: Failed at step NAMESPACE spawning /usr/lib/fprintd/fprintd: No such file or directory
systemd[1]: fprintd.service: Main process exited, code=exited, status=226/NAMESPACE
systemd[1]: fprintd.service: Failed with result 'exit-code'.
systemd[1]: Failed to start Fingerprint Authentication Daemon.
This may happen when booting with an empty /var filesystem.
For a system service, "StateDirectory=fprint" causes /var/lib/fprint and
any parent directories to be created if missing (with mode 0755 by
default, owned by the user and group of the service, which in this case
is root). In combination with ProtectSystem=strict, this state
directory will be mounted read-write. StateDirectory was introduced in
systemd 235, so require at least this version.
The /var/lib prefix is hardcoded in systemd. (Since systemd 240, the
full path(s) to StateDirectory are provided as $STATE_DIRECTORY, but
since it is always /var/lib, we continue to just hardcode that path.)
On non-systemd systems, since fprintd runs as root with no confinement,
it can create its state directory as needed (with g_mkdir_with_parents()
in file_storage_print_data_save()).
33 lines
610 B
SYSTEMD
33 lines
610 B
SYSTEMD
[Unit]
|
|
Description=Fingerprint Authentication Daemon
|
|
Documentation=man:fprintd(1)
|
|
|
|
[Service]
|
|
Type=dbus
|
|
BusName=net.reactivated.Fprint
|
|
ExecStart=@libexecdir@/fprintd
|
|
|
|
# Filesystem lockdown
|
|
ProtectSystem=strict
|
|
ProtectKernelTunables=true
|
|
ProtectControlGroups=true
|
|
# This always corresponds to /var/lib/fprint
|
|
StateDirectory=fprint
|
|
ProtectHome=true
|
|
PrivateTmp=true
|
|
|
|
# Network
|
|
PrivateNetwork=true
|
|
RestrictAddressFamilies=AF_UNIX AF_LOCAL AF_NETLINK
|
|
|
|
# Execute Mappings
|
|
MemoryDenyWriteExecute=true
|
|
|
|
# Modules
|
|
ProtectKernelModules=true
|
|
|
|
# Real-time
|
|
RestrictRealtime=true
|
|
|
|
# Privilege escalation
|
|
NoNewPrivileges=true
|