Signing the Napatech Driver for UEFI Secure Boot

Software Installation for Linux

product_line_custom
IntelĀ® PAC
Napatech SmartNIC
category
Software Installation Guide

Some kernels may require that kernel modules are cryptographically signed by a key trusted by the kernel in order to be loaded. In particular, many distributions require modules to be signed when loaded into kernels running on UEFI systems with Secure Boot enabled.

The information provided in the following sections describes the steps necessary to self-sign the Napatech driver module for running on UEFI systems with Secure Boot enabled. This document is valid for all Linux distributions using the shim1 first-stage boot loader. This includes, but not limited to, Red Hat Enterprise Linux 7, Oracle Linux 7 and CentOS 7.

The following sections are based on information from the "Red Hat Enterprise Linux 7 System Administrator's Guide"2 and is covered by Creative Commons Attribution-ShareAlike 3.0 Unported License3.

1 https://github.com/mjg59/shim
2 https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7
3 http://creativecommons.org/licenses/by-sa/3.0