DKMS

Revision 13 as of 2016-08-04 13:13:50

Clear message

DKMS do not work on systems with Secure Boot enabled

Following an UOS approved spec, Ubuntu is checking module signing by default, on kernels 4.4.0-18.34, 4.4.0-21.37, 4.2.0-42.49, 3.19.0-65.73 and 3.13.0-92.139 onwards.

Because of those changes, DKMS modules will not work on systems with Secure Boot is enabled.

In order to make DKMS work, Secure Boot needs to be disabled. There are several methods to disable Secure Boot in your system:

Method 1 - Disable Secure Boot from BIOS

  1. Enter BIOS setup
  2. Disable secure boot
  3. Save configuration
  4. Reboot the system

Method 2 - Disable Secure Boot in shim-signed

  1. Open a terminal by Ctrl + Alt + T, execute sudo update-secureboot-policy and then select Yes update-secureboot-policy.png

  2. Enter a temporary password between 8 to 16 digits. (For example, 12345678, we will use this password later.)Enter_a_temporary_password.png

  3. Enter the same password again to confirmconfirm_password.png

  4. Reboot the system and press any key when you see the blue screen (MOK management) press_any_key.png

  5. Select Change Secure Boot state change_secureboot_state.png

  6. Press the corresponding password character and press Enter. Repeat this step several times to confirm previous temporary password like 12345678 in Step 2 and Step 3. For exmaple, 2 shown in below picture enter_password.png

  7. Select Yes to disable Secure Boot in shim-signed select_yes.png

  8. Press Enter key to finish the whole procedure press_enter_key.png

  9. We can still enable Secure Boot in shim-signed again. Just execute sudo update-secureboot-policy --enable and then follow the similar steps above