This patch removes the warning message, that pops up if kernel config
'security.scc' is enabled for other architectures than x86_64, e.g. arm64:

  WARNING: linux-yocto-${PV}-r0 do_kernel_configcheck: \
      [kernel config]: This BSP contains fragments with warnings:

  [INFO]: the following symbols were not found in the active configuration:
       - CONFIG_LEGACY_VSYSCALL_EMULATE
       - CONFIG_LEGACY_VSYSCALL_NONE

Configs 'LEGACY_VSYSCALL_*' are valid only for x86_64 architecture.

Signed-off-by: Kamil Dziezyk <[email protected]>
---
 features/security/security-x86_64.cfg | 4 ++++
 features/security/security.cfg        | 4 ----
 features/security/security.scc        | 4 ++++
 3 files changed, 8 insertions(+), 4 deletions(-)
 create mode 100644 features/security/security-x86_64.cfg

diff --git a/features/security/security-x86_64.cfg 
b/features/security/security-x86_64.cfg
new file mode 100644
index 00000000..dad137f6
--- /dev/null
+++ b/features/security/security-x86_64.cfg
@@ -0,0 +1,4 @@
+# SPDX-License-Identifier: MIT
+# Modern libc no longer needs a fixed-position mapping in userspace, remove it 
as a possible target.
+# CONFIG_LEGACY_VSYSCALL_EMULATE is not set
+CONFIG_LEGACY_VSYSCALL_NONE=y
diff --git a/features/security/security.cfg b/features/security/security.cfg
index 475b647e..5befeb90 100644
--- a/features/security/security.cfg
+++ b/features/security/security.cfg
@@ -26,10 +26,6 @@ CONFIG_STACKPROTECTOR_STRONG=y
 CONFIG_EXPERT=y
 CONFIG_MODIFY_LDT_SYSCALL=n
 
-# Modern libc no longer needs a fixed-position mapping in userspace, remove it 
as a possible target.
-# CONFIG_LEGACY_VSYSCALL_EMULATE is not set
-CONFIG_LEGACY_VSYSCALL_NONE=y
-
 # Prior to v4.1, assists heap memory attacks; best to keep interface disabled.
 # CONFIG_INET_DIAG is not set
 
diff --git a/features/security/security.scc b/features/security/security.scc
index 4abdf457..c6ca31f0 100644
--- a/features/security/security.scc
+++ b/features/security/security.scc
@@ -3,3 +3,7 @@ define KFEATURE_DESCRIPTION "Enable/disable configurations that 
impact kernel se
 define KFEATURE_COMPATIBILITY all
 
 kconf non-hardware security.cfg
+
+if [ "$KARCH" = "x86_64" ]; then
+    kconf non-hardware security-x86_64.cfg
+fi
-- 
2.17.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#11121): 
https://lists.yoctoproject.org/g/linux-yocto/message/11121
Mute This Topic: https://lists.yoctoproject.org/mt/90176455/21656
Group Owner: [email protected]
Unsubscribe: https://lists.yoctoproject.org/g/linux-yocto/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to