Symptoms
– Computer on, plugged into Lenovo 40AF dock, peripherals worked, external displays did not come on. Rebooted, with dock plugged in, no effect.
Troubleshooting
–systemctl status revealed that the displaylink service was masked
–akmods --force showed the key was rejected by service
Resolution
kmodgenca -a and mokutil --import /etc/pki/akmods/certs/public_key.der
Rebooted and enrolled new MOK
System started normally and displaylink.service started, displays were now active
Yep, definitely not a bug to need to sign the driver. Somewhat new to being on Linux nearly fully time so pardon me if I say a few things wrong or if I’ve missed something obvious.
There was no change in my repos over the prior two updates which is why this losing signing threw me off. Here is the repo list I’m working from:
repo id
repo name
fedora
Fedora 44 - x86_64
fedora-cisco-openh264
Fedora 44 openh264 (From Cisco) - x86_64
fedora-multimedia
negativo17 - Multimedia
rpmfusion-nonfree-nvidia-driver
RPM Fusion for Fedora 44 - Nonfree - NVIDIA Driver
By default, when using akmod packages such as akmod-evdi the driver is built using akmods, which uses the signing key as noted above.
It seems the kmod-evdi package you have installed was built and signed by akmods from the akmod-evdi package.
I cannot explain why there would be a difference in the way the module was signed or if there even is a difference. This description of events almost seems as if you may have had secure boot disabled and might have somehow enabled it at the same time as performing the installation.
There may be similar symptoms when doing a bios firmware upgrade since that wipes out any user installed keys within bios and then would require the user repeat the mokutil import steps to enable loading locally built driver modules.
Only you would be able to identify whatever changes may have been done around the time this failure occurred, but it appears something changed related to the signing key.
Whether that was a forced change of the signing key, a bios firmware update, or a recent enabling of secure boot, it is impossible for us to tell (only the local user would know). AFAIK only one of those 3 changes would result in the symptoms and the fix you described.
Thanks for the detailed response! Only thing I could point to without digging too deep is if I missed a bios update that was pushed, which didn’t break anything until the update. Outside of that, secure boot was always enabled on this machine.
A bios update would only be performed when using fwupdmgr for some systems, or manually otherwise. It is never performed automatically. Sometimes packagekit may prompt the user to perform firmware updates but it still requires user approval before changes are done.
Generally the signing keys under /etc/pki/akmods/certs/ are only created once; either manually using kmodgenca the first time akmods is installed or automatically with the first reboot after akmods is installed.
Once that key is created and imported into bios it is always used to sign the modules and never changes unless the user either removes the old key and a new one is created automatically or kmodgenca is forced to create a new key.
Having secure boot enabled long term seems to rule out the possibility of changing its status as a possibility.
You can see how many locally created signing keys are in bios with the command mokutil -l | grep Issuer and the ones of interest would be the ones that show your local hostname. This may be a way to identify the cause if more than one is shown as locally created.