-
When secure boot is enabled, modules must be signed - otherwise the kernel will refuse to load them. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
For your convenience, the build system provides as Prerequisites
How to create and enroll a signing certificate is outside the scope of this document. Simple usagemake sign This assumes that the certificate/signing key are listed in Advanced usageYou can manually pass the signing key and certificate to the build process via the If the key (and/or certificate) require super-user proviliges to be read, run the build process through read -s -p "Passphrase for your signing key: " KBUILD_SIGN_PIN
export KBUILD_SIGN_PIN
sudo --preserve-env=KBUILD_SIGN_PIN \
make sign KBUILD_SIGN_CERT=/var/lib/shim-signed/mok/MOK.der KBUILD_SIGN_KEY=/var/lib/shim-signed/mok/MOK.priv |
Beta Was this translation helpful? Give feedback.
For your convenience, the build system provides as
sign
target.Prerequisites
How to create and enroll a signing certificate is outside the scope of this document.
For Debian systems (and probably others), check out the documentation:
Simple usage
This assumes that the certificate/signing key are listed in
/etc/dkms/framework.conf
asmok_certificate
resp.mok_signing_key
.It also assumes that these files are readable by the current user and do not require a password to unlock.
Advanced usage
You can manually pass the si…