Some kernels may require that kernel modules are cryptographically signed by a key trusted by the kernel in order to be loaded. In particular, many distributions require modules to be signed when loaded into kernels running on UEFI systems with Secure Boot enabled.
The information provided in the following sections describes the steps necessary to self-sign the Napatech driver module for running on UEFI systems with Secure Boot enabled. This document is valid for all Linux distributions using the shim1 first-stage boot loader. This includes, but not limited to, Red Hat Enterprise Linux 7, Oracle Linux 7 and CentOS 7.