mouse install GTX2080TI+CUDA10.0+CUDAA7.0要死了

在Ubuntu系统中,UEFI Secure Boot默认检查模块签名。为了使DKMS模块在Secure Boot启用的情况下正常工作,需要导入系统固件的Secure Boot签名密钥,或者禁用Secure Boot。本文提供了三种方法来配置系统,包括安装所需DKMS包、在shim-signed中禁用Secure Boot以及在BIOS中禁用Secure Boot。
摘要由CSDN通过智能技术生成

https://wiki.ubuntu.com/UEFI/SecureBoot/DKMS

 

 

DKMS

 

DKMS modules need to be configured to work with UEFI Secure Boot

Ubuntu is now checking module signing by default, on kernels 4.4.0-18.34, 4.4.0-21.37, 4.2.0-42.49, 3.19.0-65.73 and 3.13.0-92.139 onwards. You can read more details in this bug in Launchpad.

Because of those changes, DKMS modules will not work on systems with Secure Boot enabled unless correctly configured.

In order to make DKMS work, Secure Boot signing keys for the system must be imported in the system firmware, otherwise Secure Boot needs to be disabled. There are several methods to configure your system to properly load DKMS modules with Secure Boot enabled.

 

Method 1 - Install the DKMS package you need

Simply install the package you need. Packages that make use of DKMS should prompt you to create a new Machine-Owner key (it will be done for you), and will guide you through the steps to enroll that key in your system's firmware.

 

Method 2 - Disable Secure Boot in shim-signed

  1. Open a terminal (Ctrl + Alt + T), and execute sudo mokutil --disable-validation.

  2. Enter a temporary password between 8 to 16 digits. (For example, 12345678, we will use this password later
  3. Enter the same password again to confirm.
  4. Reboot the system and press any key when you see the blue screen (MOK management

DKMS?action=AttachFile&do=get&target=press_any_key.pnguploading.4e448015.gif转存失败重新上传取消align="left"

  1. Select Change Secure Boot state

DKMS?action=AttachFile&do=get&target=change_secureboot_state.pnguploading.4e448015.gif转存失败重新上传取消align="left"

  1. Enter the password you had selected in Step 2 and press Enter.

DKMS?action=AttachFile&do=get&target=enter_password.pnguploading.4e448015.gif转存失败重新上传取消align="left"

  1. Select Yes to disable Secure Boot in shim-signed.

DKMS?action=AttachFile&do=get&target=select_yes.pnguploading.4e448015.gif转存失败重新上传取消align="left"

  1. Press Enter key to finish the whole procedure.

DKMS?action=AttachFile&do=get&target=press_enter_key.pnguploading.4e448015.gif转存失败重新上传取消align="left"

To re-enable Secure Boot validation in shim, simply run sudo mokutil --enable-validation.

 

Method 3 - Disable Secure Boot from BIOS

  1. Enter BIOS setup
  2. Disable secure boot
  3. Save configuration
  4. Reboot the system

 

Manual method

You may also opt to sign modules yourself. To make this simple, you can use the command:

sudo update-secureboot-policy --new-key

To create a new MOK key to use for signing, then run the appropriate kmodsign command to sign your kernel module. After the module is signed, run sudo update-secureboot-policy --enroll-key to step through the enrollment wizard, or do the enrollment yourself by running sudo mokutil --import <your key>.

UEFI/SecureBoot/DKMS (last edited 2018-06-26 19:53:49 by cyphermox)

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值