From ea25e725903c9c498b692322ccf43c24db94e5fa Mon Sep 17 00:00:00 2001 From: Erwin D <31799121+Erwin-D@users.noreply.github.com> Date: Thu, 30 Apr 2020 12:10:22 +0200 Subject: [PATCH] Create self-signing-modules.md --- self-signing-modules.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 self-signing-modules.md diff --git a/self-signing-modules.md b/self-signing-modules.md new file mode 100644 index 0000000..2f5fb1c --- /dev/null +++ b/self-signing-modules.md @@ -0,0 +1,18 @@ +You might not want to (or be able to) disable UEFI Secure Boot. In this case you can selfsign the evdi module. + +[Øyvind Stegard](https://github.com/oyvindstegard) wrote a very clear and helpful [guide](http://web.archive.org/web/20191119232110/https://stegard.net/2016/10/virtualbox-secure-boot-ubuntu-fail/) for signing VirtualBox modules. You only have to replace step 5 by this: + +`# nano /root/module-signing/sign-evdi-module.sh` +``` +#!/bin/bash + +for modfile in $(dirname $(modinfo -n evdi))/*.ko; do + echo "Signing $modfile" + /usr/src/linux-headers-$(uname -r)/scripts/sign-file sha256 \ + /root/module-signing/MOK.priv \ + /root/module-signing/MOK.der "$modfile" +done +``` +`# chmod 700 /root/module-signing/sign-evdi-module.sh` + +And you can ignore step 7.