You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[$]> lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.5 LTS
Release: 22.04
Codename: jammy
[$]> dpkg -l | egrep -w '(grub|dkms|shim|displaylink|evdi)'
ii displaylink-driver 6.1.0-17 amd64 DisplayLink Driver Software provides production quality support for DisplayLink USB 3.0 devices on specific variants of desktop Ubuntu Linux.
ii dkms 2.8.7-2ubuntu2.2 all Dynamic Kernel Module Support Framework
ii evdi 1.14.8-133 amd64 Extensible Virtual Display Interface (EVDI) is a Linux® kernel module that enables management of multiple screens.
ii grub-common 2.06-2ubuntu7.2 amd64 GRand Unified Bootloader (common files)
ii grub-efi-amd64 2.06-2ubuntu14.4 amd64 GRand Unified Bootloader, version 2 (EFI-AMD64 version)
ii grub-efi-amd64-bin 2.06-2ubuntu14.4 amd64 GRand Unified Bootloader, version 2 (EFI-AMD64 modules)
rc shim-signed 1.51.3+15.7-0ubuntu1 amd64 Secure Boot chain-loading bootloader (Microsoft-signed binary)
My SecureBoot configuration is totally hardened and use certificates issued by own PKI, so no microsoft or any vendor certificates are involved in chain.
I use built-in DKMS hook to auto-sign modules by proper key on install.
In context of such configuration of the OS I have no need to have shim-signed package installed, so no 'update-secureboot-policy' command is available.
SUGGESTION: Is it possible to adjust logic of enroll_secureboot_key() not to fail in case no 'update-secureboot-policy' command is available or DKMS hook is configured?
The text was updated successfully, but these errors were encountered:
Hi All,
My environment is:
My SecureBoot configuration is totally hardened and use certificates issued by own PKI, so no microsoft or any vendor certificates are involved in chain.
I use built-in DKMS hook to auto-sign modules by proper key on install.
In context of such configuration of the OS I have no need to have
shim-signed
package installed, so no'update-secureboot-policy'
command is available.It totally brakes logic of this function https://github.com/DisplayLink/evdi/blob/main/module/dkms_install.sh#L26-L36
Because it rely on unconditional presence of
"update-secureboot-policy --enroll-key"
command in case'mokutil'
reports that SecureBoot is enabled.In result this error appears on every
evdi
module upgrade at my systemevdi/module/dkms_install.sh
Line 62 in 2da2704
As workaround I patch
dkms_install.sh
on every update, in order to get this 'if block' commentedevdi/module/dkms_install.sh
Line 61 in 2da2704
SUGGESTION: Is it possible to adjust logic of
enroll_secureboot_key()
not to fail in case no'update-secureboot-policy'
command is available or DKMS hook is configured?The text was updated successfully, but these errors were encountered: