Driver Installation
Rev 2.6
36
Mellanox Technologies
4.1.8.1 Enrolling Mellanox's x.509 Public Key On your Systems
In order to support loading MLNX_OFED drivers when an OS supporting Secure Boot boots on
a UEFI-based system with Secure Boot enabled, the Mellanox x.509 public key should be added
to the UEFI Secure Boot key database and loaded onto the system key ring by the kernel.
Follow these steps below to add the Mellanox's x.509 public key to your system:
Step 1.
Download the x.509 public key.
Step 2.
Add the public key to the MOK list using the mokutil utility.
You will be asked to enter and confirm a password for this MOK enrollment request.
Step 3.
Reboot the system.
The pending MOK key enrollment request will be noticed by
shim.efi
and it will launch
Mok
-
Manager.efi
to allow you to complete the enrollment from the UEFI console. You will need to
enter the password you previously associated with this request and confirm the enrollment. Once
done, the public key is added to the MOK list, which is persistent. Once a key is in the MOK list,
it will be automatically propagated to the system key ring and subsequent will be booted when
the UEFI Secure Boot is enabled.
4.1.8.2 Removing Signature from Kernel Modules
The signature can be removed from a signed kernel module using the 'strip' utility which is pro-
vided by the 'binutils' package.
The strip utility will change the given file without saving a backup. The operation can be undo
only by resigning the kernel module. Hence, we recommend backing up a copy prior to removing
the signature.
To remove the signature from the MLNX_OFED kernel modules:
Step 1.
Remove the signature.
After the signature has been removed, a message as the below will no longer be presented
upon module loading:
Prior to adding the Mellanox's x.509 public key to your system, please make sure:
• the 'mokutil' package is installed on your system
• the system is booted in UEFI mode
# wget http://www.mellanox.com/downloads/ofed/mlnx_signing_key_pub.der
# mokutil --import mlnx_signing_key_pub.der
To see what keys have been added to the system key ring on the current boot, install the 'keyutils'
package and run:
#keyctl list %:.system_keyring
# strip -g my_module.ko
# rpm -qa | grep -E "kernel-ib|mlnx-ofa_kernel|iser|srp|knem" | xargs rpm -ql | grep
"\.ko$" | xargs strip -g
"Request for unknown module key 'Mellanox Technologies signing key:
61feb074fc7292f958419386ffdd9d5ca999e403' err -11"