Driver Installation
Rev 1.9
36
Mellanox Technologies
Step 1.
Download the x.509 public key.
Step 2.
Add the public key to the MOK list using the mokutil utility.
You will be asked to enter and confirm a password for this MOK enrollment request.
Step 3.
Reboot the system.
The pending MOK key enrollment request will be noticed by
shim.efi
and it will launch
Mok
-
Manager.efi
to allow you to complete the enrollment from the UEFI console. You will need to
enter the password you previously associated with this request and confirm the enrollment. Once
done, the public key is added to the MOK list, which is persistent. Once a key is in the MOK list,
it will be automatically propagated to the system key ring and subsequent will be booted when
the UEFI Secure Boot is enabled.
4.1.8.2 Removing Signature from Kernel Modules
The signature can be removed from a signed kernel module using the 'strip' utility which is pro-
vided by the 'binutils' package.
The strip utility will change the given file without saving a backup. The operation can be undone
only by resigning the kernel module. Hence, we recommend backing up a copy prior to removing
the signature.
To remove the signature from the MLNX_OFED kernel modules:
Step 1.
Remove the signature.
After the signature has been removed, a massage as the below will no longer be presented
upon module loading:
However, please note that a similar message as the following will still be presented:
This message is presented once, only for each boot of the first module that either has no
signature or whose key is not in the kernel key ring. Therefore, it is much easier to miss
this message. You will not see it on repeated tests where you unload and reload a kernel
module until you reboot. There is no way to eliminate this message.
Step 2.
Update the initramfs on RHEL systems with the stripped modules.
# wget http://www.mellanox.com/downloads/ofed/mlnx_signing_key_pub.der
# mokutil --import mlnx_signing_key_pub.der
To see what keys have been added to the system key ring on the current boot, install the 'keyutils'
package and run:
#keyctl list %:.system_keyring
# strip -g my_module.ko
# rpm -qa | grep -E "kernel-ib|mlnx-ofa_kernel|iser|srp|knem" | xargs rpm -ql | grep
"\.ko$" | xargs strip -g
"Request for unknown module key 'Mellanox Technologies signing key:
61feb074fc7292f958419386ffdd9d5ca999e403' err -11"
"my_module: module verification failed: signature and/or required key missing - taint
-
ing kernel"
mkinitrd /boot/initramfs-$(uname -r).img $(uname -r) --force