bluez5: update 5.64 -> 5.65

Drop fix_service.patch as it is merged upstream.

(From OE-Core rev: 10374b5ed4b5550eadacbcd71ae20b751ce5c038)

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Alexander Kanavin
2022-08-08 08:42:00 +02:00
committed by Richard Purdie
parent 7d219c2440
commit 936f15bc72
3 changed files with 1 additions and 32 deletions

View File

@@ -53,7 +53,6 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/bluetooth/bluez-${PV}.tar.xz \
${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '', 'file://0001-Allow-using-obexd-without-systemd-in-the-user-sessio.patch', d)} \
file://0001-tests-add-a-target-for-building-tests-without-runnin.patch \
file://0001-test-gatt-Fix-hung-issue.patch \
file://fix_service.patch \
"
S = "${WORKDIR}/bluez-${PV}"

View File

@@ -1,30 +0,0 @@
The systemd bluetooth service failed to start because the /var/lib/bluetooth
path of ReadWritePaths= is created by the bluetooth daemon itself.
The commit systemd: Add more filesystem lockdown (442d211) add ReadWritePaths=/etc/bluetooth
and ReadOnlyPaths=/var/lib/bluetooth options to the bluetooth systemd service.
The existing ProtectSystem=full option mounts the /usr, the boot loader
directories and /etc read-only. This means the two option are useless and could be removed.
Upstream-Status: Submitted [https://github.com/bluez/bluez/issues/329]
Index: bluez-5.64/src/bluetooth.service.in
===================================================================
--- bluez-5.64.orig/src/bluetooth.service.in
+++ bluez-5.64/src/bluetooth.service.in
@@ -15,12 +15,12 @@ LimitNPROC=1
# Filesystem lockdown
ProtectHome=true
-ProtectSystem=full
+ProtectSystem=strict
PrivateTmp=true
ProtectKernelTunables=true
ProtectControlGroups=true
-ReadWritePaths=@statedir@
-ReadOnlyPaths=@confdir@
+ConfigurationDirectory=bluetooth
+StateDirectory=bluetooth
# Execute Mappings
MemoryDenyWriteExecute=true

View File

@@ -1,6 +1,6 @@
require bluez5.inc
SRC_URI[sha256sum] = "ae437e65b6b3070c198bc5b0109fe9cdeb9eaa387380e2072f9de65fe8a1de34"
SRC_URI[sha256sum] = "2565a4d48354b576e6ad92e25b54ed66808296581c8abb80587051f9993d96d4"
# These issues have kernel fixes rather than bluez fixes so exclude here
CVE_CHECK_IGNORE += "CVE-2020-12352 CVE-2020-24490"