Hi, Christian wrote: > [ 47.042454] Lockdown: Xorg: raw io port access is restricted; see man > kernel_lockdown.7 > I think it's still SecureBoot, but what is it this time? Can anyone help
At least the above log snippet seems to be related to SecureBoot. In https://manpages.debian.org/bookworm/manpages/kernel_lockdown.7.en.html i see "On an EFI-enabled x86 or arm64 machine, lockdown will be automatically enabled if the system boots in EFI Secure Boot mode. Coverage When lockdown is in effect, a number of features are disabled or have their use restricted. This includes special device files and kernel services that allow direct access of the kernel image:" [...] NOTES The Kernel Lockdown feature is enabled by CONFIG_SECURITY_LOCKDOWN_LSM. The lsm=lsm1,...,lsmN command line parameter controls the sequence of the initialization of Linux Security Modules. It must contain the string lockdown to enable the Kernel Lockdown feature. If the command line parameter is not specified, the initialization falls back to the value of the deprecated security= command line parameter and further to the value of CONFIG_LSM." So i guess you have to look into your boot configuration for kernel parameter "lockdown". On https://bbs.archlinux.org/viewtopic.php?id=290866 i see this statement by espritlibre: "Re: Secure boot and Nvidia i have secure boot enabled, but lockdown disabled (for another reason). loading the nvidia module does taint the kernel, but loads and work just fine with prime-run on a hybrid systme. i'm not signing OOT modules, just kernel and efi stuff." (Whatever "prime-run" might be ...) Have a nice day :) Thomas