Signing the Napatech Driver for UEFI Secure Boot

Software Installation for Linux

Platform
Intel® PAC
Napatech SmartNIC
Content Type
Software Installation Guide
Capture Software Version
Link™ Capture Software 12.11

Some kernels may require that kernel modules are cryptographically signed by a key trusted by the kernel in order to be loaded. In particular, many distributions require modules to be signed when loaded into kernels running on UEFI systems with Secure Boot enabled.

The information provided in the following sections describes the steps necessary to self-sign the Napatech driver module for running on UEFI systems with Secure Boot enabled. This document is valid for all Linux distributions using the shim1 first-stage boot loader. This includes, but not limited to, Red Hat Enterprise Linux 7, Oracle Linux 7 and CentOS 7.

The following sections are based on information from the "Red Hat Enterprise Linux 7 System Administrator's Guide"2 and is covered by Creative Commons Attribution-ShareAlike 3.0 Unported License3.

1 https://github.com/mjg59/shim
2 https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7
3 http://creativecommons.org/licenses/by-sa/3.0