Hi,

Christian wrote:
> [   47.042454] Lockdown: Xorg: raw io port access is restricted; see man 
> kernel_lockdown.7
> I think it's still SecureBoot, but what is it this time? Can anyone help

At least the above log snippet seems to be related to SecureBoot.
In
  https://manpages.debian.org/bookworm/manpages/kernel_lockdown.7.en.html
i see

  "On an EFI-enabled x86 or arm64 machine, lockdown will be automatically
   enabled if the system boots in EFI Secure Boot mode.
   Coverage
   When lockdown is in effect, a number of features are disabled or have
   their use restricted. This includes special device files and kernel
   services that allow direct access of the kernel image:"
   [...]
  NOTES
    The Kernel Lockdown feature is enabled by CONFIG_SECURITY_LOCKDOWN_LSM.
    The lsm=lsm1,...,lsmN command line parameter controls the sequence of
    the initialization of Linux Security Modules. It must contain the
    string lockdown to enable the Kernel Lockdown feature. If the command
    line parameter is not specified, the initialization falls back to the
    value of the deprecated security= command line parameter and further
    to the value of CONFIG_LSM."

So i guess you have to look into your boot configuration for kernel
parameter "lockdown".

On
  https://bbs.archlinux.org/viewtopic.php?id=290866
i see this statement by espritlibre:

  "Re: Secure boot and Nvidia
   i have secure boot enabled, but lockdown disabled  (for another
   reason). loading the nvidia module does taint the kernel, but loads
   and work just fine with prime-run on a hybrid systme. i'm not signing
   OOT modules, just kernel and efi stuff."

(Whatever "prime-run" might be ...)


Have a nice day :)

Thomas

Reply via email to