Le vendredi 3 janvier 2020 17:10:04 UTC+1, l0f...@tuta.io a écrit : [...] > I've used > https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/debian-10.2.0-amd64-netinst.iso
Good. I would verify shim* packages are installed and well configured (State/Error flags "ii" at the beginning of the lines); didier@hp-notebook14:~$ sudo dpkg -l shim* Souhait=inconnU/Installé/suppRimé/Purgé/H=à garder | État=Non/Installé/fichier-Config/dépaqUeté/échec-conFig/H=semi-installé/W=attend-traitement-déclenchements |/ Err?=(aucune)/besoin Réinstallation (État,Err: majuscule=mauvais) ||/ Nom Version Architecture Description +++-=========================-============================-============-================================================================ un shim <aucune> <aucune> (aucune description n'est disponible) ii shim-helpers-amd64-signed 1+15+1533136590.3beb971+7 amd64 boot loader to chain-load signed boot loaders (signed by Debian) ii shim-signed:amd64 1.33+15+1533136590.3beb971-7 amd64 Secure Boot chain-loading bootloader (Microsoft-signed binary) ii shim-signed-common 1.33+15+1533136590.3beb971-7 all Secure Boot chain-loading bootloader (common helper scripts) ii shim-unsigned 15+1533136590.3beb971-7 amd64 boot loader to chain-load signed boot loaders under Secure Boot then I would verify if what I think is necessary is present : a third party Microsoft tool (but perhaps I am wrong): didier@hp-notebook14:~$ sudo mokutil --db | grep -i issuer Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Root Certificate Authority 2010 CA Issuers - URI:http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Corporation Third Party Marketplace Root CA Issuers - URI:http://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt Issuer: C=US, O=Hewlett-Packard Company, CN=Hewlett-Packard Printing Device Infrastructure CA didier@hp-notebook14:~$ sudo mokutil --kek | grep -i issuer Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=Microsoft Corporation Third Party Marketplace Root CA Issuers - URI:http://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt Issuer: C=US, O=Hewlett-Packard Company, CN=Hewlett-Packard Printing Device Infrastructure CA I reach there my limitations to understand clearly how SecureBoot and UEFI work, but on my laptop, the Microsoft Thir Party thing seems to be enabled when enrolling something called "HP factory keys" or something of the same kind (I have forgotten the exact name) in the HP UEFI interface. But perhaps on your Lenovo you have ton confirm (by entering a code prompted by the UEFI, for example) at boot time that you really want to enroll keys that the shim is trying to install. So I would try this: sudo dpkg-reconfigure shim-helpers-amd64-signed shim-signed:amd64 shim-signed-common shim-unsigned and then reboot and see if the UEFI ask me to confirm any change and verify if SecureBoot is really on: didier@hp-notebook14:~$ sudo mokutil --sb-state SecureBoot disabled !(in my case that is volontary) > efibootmgr [...] I am persuaded that efibootmgr/efivar & al may present perfect informations but are sometimes superseded by the manufacturer implementation of the UEFI standard