/debian/patches/features/all/lockdown/
../
0001-Add-the-ability-to-lock-down-access-to-the-running-k.patch
0003-ima-require-secure_boot-rules-in-lockdown-mode.patch
0004-Enforce-module-signatures-if-the-kernel-is-locked-do.patch
0005-Restrict-dev-mem-kmem-port-when-the-kernel-is-locked.patch
0006-kexec-Disable-at-runtime-if-the-kernel-is-locked-dow.patch
0007-Copy-secure_boot-flag-in-boot-params-across-kexec-re.patch
0008-kexec_file-Restrict-at-runtime-if-the-kernel-is-lock.patch
0009-hibernate-Disable-when-the-kernel-is-locked-down.patch
0010-uswsusp-Disable-when-the-kernel-is-locked-down.patch
0011-PCI-Lock-down-BAR-access-when-the-kernel-is-locked-d.patch
0012-x86-Lock-down-IO-port-access-when-the-kernel-is-lock.patch
0013-x86-msr-Restrict-MSR-access-when-the-kernel-is-locke.patch
0014-asus-wmi-Restrict-debugfs-interface-when-the-kernel-.patch
0015-ACPI-Limit-access-to-custom_method-when-the-kernel-i.patch
0016-acpi-Ignore-acpi_rsdp-kernel-param-when-the-kernel-h.patch
0017-acpi-Disable-ACPI-table-override-if-the-kernel-is-lo.patch
0018-acpi-Disable-APEI-error-injection-if-the-kernel-is-l.patch
0020-Prohibit-PCMCIA-CIS-storage-when-the-kernel-is-locke.patch
0021-Lock-down-TIOCSSERIAL.patch
0022-Lock-down-module-params-that-specify-hardware-parame.patch
0023-x86-mmiotrace-Lock-down-the-testmmiotrace-module.patch
0024-debugfs-Disallow-use-of-debugfs-files-when-the-kerne.patch
0025-Lock-down-proc-kcore.patch
0026-Lock-down-kprobes.patch
0027-bpf-Restrict-kernel-image-access-functions-when-the-.patch
0028-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch
0029-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch
0032-efi-Restrict-efivar_ssdt_load-when-the-kernel-is-loc.patch
ACPI-configfs-Disallow-loading-ACPI-tables-when-lock.patch
arm64-add-kernel-config-option-to-lock-down-when.patch
enable-cold-boot-attack-mitigation.patch
lockdown-refer-to-debian-wiki-until-manual-page-exists.patch
mtd-disable-slram-and-phram-when-locked-down.patch