diff --git a/README.md b/README.md index bb333e8b..2f831aba 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # Dynamic Kernel Module System (DKMS) -This intention of this README is to explain how DKMS can be used in conjunction with tarballs which contain a dkms.conf file within them. +This intention of this README is to explain how DKMS can be used in conjunction with tarballs which contain a `dkms.conf` file within them. The DKMS project (and any updates) can be found at: https://github.com/dkms-project/dkms @@ -17,7 +17,6 @@ make install-redhat Distribution specific installations (RPM, DEB, etc.) are not contained in this source repository. - ## Installation of DKMS Tarballs DKMS can install directly from the following: @@ -115,7 +114,6 @@ Signing key: /var/lib/dkms/mok.key Public certificate (MOK): /var/lib/dkms/mok.pub ``` - ## Secure Boot On an UEFI system with Secure Boot enabled, modules require signing (as described in the above paragraph) before they can be loaded and the firmware of the system must know the correct public certificate to verify the module signature. @@ -185,7 +183,6 @@ UEFI specification 2.11 [contains a list of valid encryption keys](https://uefi. The list is quite limited, basically offering only RSA as a valid key type. For maximum compatibility, DKMS generates the MOK certificate with a *2048 bit RSA key with SHA-2 256 as a digest*. - ## Further Documentation Once DKMS is installed, you can reference its man page for further information on different DKMS options and also to understand the formatting of a module's `dkms.conf` configuration file. diff --git a/images/logo.png b/images/logo.png new file mode 100644 index 00000000..b2257539 Binary files /dev/null and b/images/logo.png differ diff --git a/images/logo.xcf b/images/logo.xcf new file mode 100644 index 00000000..69e8ac85 Binary files /dev/null and b/images/logo.xcf differ