security/Kconfig: further restrict HARDENED_USERCOPY

It doesn't make sense to have HARDENED_USERCOPY for root users when either
/dev/kmem is enabled or /dev/mem can be used to read kernel memory (i.e.
!STRICT_DEVMEM).

Signed-off-by: Tycho Andersen <tycho@docker.com>
CC: Kees Cook <keescook@chromium.org>
CC: "Serge E. Hallyn" <serge@hallyn.com>
CC: James Morris <james.l.morris@oracle.com>
[kees: adjust commit log slightly]
Signed-off-by: Kees Cook <keescook@chromium.org>
1 file changed