Package: src:linux Version: 4.5-1~exp1 Severity: important Tags: security To ensure the integrity of the kernel, we should support a securelevel where all modules must be signed by a trusted key and all APIs allowing arbitrary memory writes are disabled.
To meet Secure Boot requirements, we need to turn this on whenever booted with SB enabled. Ben. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.4.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)