diff mbox series

[BlueZ] build: Fix bluetooth.service

Message ID 20220414215242.554396-1-luiz.dentz@gmail.com
State New
Headers show
Series [BlueZ] build: Fix bluetooth.service | expand

Commit Message

Luiz Augusto von Dentz April 14, 2022, 9:52 p.m. UTC
From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>

This fixes bluetooth.service failing to start if statedir has not been
created yet:

bluetooth.service: Failed to set up mount namespacing:
/run/systemd/unit-root/var/lib/bluetooth: No such file or directory

It also removes ReadOnlyPaths since ProtectSystem=full already mounts
the entire filesystem as read-only.

Fixes: https://github.com/bluez/bluez/issues/329
---
 src/bluetooth.service.in | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

Comments

bluez.test.bot@gmail.com April 15, 2022, 6:58 a.m. UTC | #1
This is automated email and please do not reply to this email!

Dear submitter,

Thank you for submitting the patches to the linux bluetooth mailing list.
This is a CI test results with your patch series:
PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=632426

---Test result---

Test Summary:
CheckPatch                    PASS      1.40 seconds
GitLint                       PASS      1.14 seconds
Prep - Setup ELL              PASS      50.85 seconds
Build - Prep                  PASS      0.76 seconds
Build - Configure             PASS      10.40 seconds
Build - Make                  PASS      1445.21 seconds
Make Check                    PASS      13.17 seconds
Make Check w/Valgrind         PASS      510.73 seconds
Make Distcheck                PASS      267.70 seconds
Build w/ext ELL - Configure   PASS      10.33 seconds
Build w/ext ELL - Make        PASS      1458.01 seconds
Incremental Build with patchesPASS      1549.66 seconds



---
Regards,
Linux Bluetooth
diff mbox series

Patch

diff --git a/src/bluetooth.service.in b/src/bluetooth.service.in
index f18801866..12adad34f 100644
--- a/src/bluetooth.service.in
+++ b/src/bluetooth.service.in
@@ -19,8 +19,7 @@  ProtectSystem=full
 PrivateTmp=true
 ProtectKernelTunables=true
 ProtectControlGroups=true
-ReadWritePaths=@statedir@
-ReadOnlyPaths=@confdir@
+ReadWritePaths=-@statedir@
 
 # Execute Mappings
 MemoryDenyWriteExecute=true