CONFIG_INTEGRITY is useless without enabling IMA/EVM.
We can't require enabling IMA/EVM because there are other
file system integrity mechanisms like DM_VERITY, FS_VERITY, etc.
So there is no reason to check CONFIG_INTEGRITY.
Refers to #75
modules_not_set)]
# 'harden_userspace'
- if arch in ('X86_64', 'ARM64', 'X86_32'):
- l += [KconfigCheck('harden_userspace', 'defconfig', 'INTEGRITY', 'y')]
- if arch == 'ARM':
- l += [KconfigCheck('harden_userspace', 'my', 'INTEGRITY', 'y')]
if arch == 'ARM64':
l += [KconfigCheck('harden_userspace', 'defconfig', 'ARM64_PTR_AUTH', 'y')]
l += [KconfigCheck('harden_userspace', 'defconfig', 'ARM64_BTI', 'y')]