public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* /dev/mem and secure boot
@ 2019-09-06 11:02 Jean Delvare
  2019-09-06 12:15 ` Greg Kroah-Hartman
  0 siblings, 1 reply; 7+ messages in thread
From: Jean Delvare @ 2019-09-06 11:02 UTC (permalink / raw)
  To: Arnd Bergmann, Greg Kroah-Hartman, Thomas; +Cc: LKML

I've been bitten recently by mcelog not working on machines started in
secure boot mode. mcelog tries to read DMI information from /dev/mem
and fails to open it.

This made me wonder: if not even root can read /dev/mem (nor, I
suppose, /dev/kmem and /dev/port) in secure boot mode, why are we
creating these device nodes at all in the first place? Can't we detect
that we are in secure boot mode and skip that step, and reap the rewards
(faster boot, lower memory footprint and less confusion)?

Thanks,
-- 
Jean Delvare
SUSE L3 Support

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2019-09-16  9:38 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-09-06 11:02 /dev/mem and secure boot Jean Delvare
2019-09-06 12:15 ` Greg Kroah-Hartman
2019-09-06 15:07   ` Jean Delvare
2019-09-06 15:08     ` Jean Delvare
2019-09-09 13:09   ` Jean Delvare
2019-09-12 10:44     ` Thomas Renninger
2019-09-16  9:38     ` David Howells

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox