README angepasst, modules.example added

This commit is contained in:
Jakobus Schürz 2019-07-17 23:31:52 +02:00
parent 97eb98317b
commit 3627833f61
3 changed files with 22 additions and 4 deletions

1
.gitignore vendored
View file

@ -1,2 +1,3 @@
*.der *.der
*.priv *.priv
modules

View file

@ -3,25 +3,37 @@
* Create key-pair * Create key-pair
``` ```
create_module_key.sh -c ./sign-modules.sh -c
``` ```
you get asked for a Password for the new key. Remember it, you'll need it a reboot once to confirm the new installed key.
* Sign your proprietary modules * Sign your proprietary modules
``` ```
create_module_key.sh -s \<modulename\>[ \<modulename\>][ \<modulename\>]... Usage sign modules:
./sign-modules.sh <modulename> [<modulename>] [<modulename>]...
./sign-modules.sh -k <kernelversion> <modulename> [<modulename>] [<modulename>]...
./sign-modules.sh -k <kernelversion> -f <modulesfile>
./sign-modules.sh -f <modulesfile>
-k <kernelversion> output of »uname -r«
if not given, it takes current kernelversion
-f <modulesfile> plaintext file with newlineseparated list of modules to sign
``` ```
* Reboot * Reboot
If you have a Dualboot with Windows and Bitlocker, you have to type in you Recreation-Key for Bitlocker on first boot in Windows, because you added a key to UEFI If you have a Dualboot with Windows and Bitlocker, you have to type in you Recreation-Key for Bitlocker on first boot in Windows, because you added a key to UEFI
Every time you install a new kernel, you have to boot to the new kernel and run Every time you install a new kernel, you have to boot to the new kernel and run
create_module_key.sh -s \<modulename\>[ \<modulename\>][ \<modulename\>]... ```
./sign-modules.sh -k <kernelversion> -f <modulesfile>
```
* Reboot * Reboot
again. again.
This script creates a key. You need it for signing every module for every new kernel you install on your machine!!! Keep it save!

5
modules.example Normal file
View file

@ -0,0 +1,5 @@
vboxdrv
vboxnetflt
vboxnetadp
vboxpci
acpi_call