Sponsor:

Your company here, and a link to your site. Click to find out more.

genprotimg - Man Page

Create a protected virtualization image

Synopsis

genprotimg -k HOST_KEY_DOCUMENT... -C CERTIFICATE... -i VMLINUZ [-r RAMDISK] [-p PARMFILE] -o OUTFILE [OPTION]...

Description

Use genprotimg to generate a single bootable image file with encrypted and integrity-protected parts. The command requires a kernel image, a host-key document, certificates for the host-key document verification, and an output file name. Optionally, specify an initial RAM filesystem, and a file containing the kernel parameters. If the command should be run offline, use the --offline option and specify the certificate revocation lists (CRLs) by using the --crl option. Should special circumstances require it, you can optionally specify your own keys for the encryption by using the experimental options. For all certificates, CRLs, and host-key documents, both the PEM and DER input formats are supported. In the resulting image file, a plain text boot loader, the encrypted components for kernel, initial RAM disk, kernel parameters, and the encrypted and integrity-protected header are concatenated. The header contains metadata necessary for running the guest in protected mode.

Use this image file as a kernel image for zipl or for a direct kernel boot using QEMU.

Options

-h,  --help

Prints usage information, then exits.

--help-experimental

Prints experimental usage information, then exits.

--help-all

Prints all usage information, then exits.

-V,  --verbose

Provides more detailed output.

-k,  --host-key-document=HOST_KEY_DOCUMENT

Specifies a host-key document. At least one is required. Specify this option multiple times to enable the image to run on more than one host.

-C,  --cert=FILE

Specifies the certificate that is used to establish a chain of trust for the verification of the host-key documents. Specify this option twice to specify the IBM Z signing key and the intermediate CA certificate (signed by the root CA). Required. Ignored if --no-verify is specified.

-o,  --output=OUTPUT_FILE

Specifies the output file. Required.

-i,  --image=VMLINUZ

Specifies the Linux kernel image file. Required.

-r,  --ramdisk=RAMDISK

Specifies the RAM disk image. Optional.

-p,  --parmfile=PARMFILE

Specifies the kernel command line stored in PARMFILE. Optional.

--crl=FILE

Specifies the revocation list that is used to check whether a certificate of the chain of trust is revoked. Specify this option multiple times to use multiple CRLs. Optional.

--offline

Specifies offline mode, in which no attempt is made to download CRLs. Optional.

--root-ca=FILE

Specifies the root CA certificate for the verification. If omitted, the system wide root CAs installed on the system is used. Use this only if you trust the specified certificate. Optional.

--no-verify

Does not require the host-key documents to be valid. Do not use for a production image unless you verified the host-key document before. Optional.

--comm-key=FILE

Specifies the customer communication key (CCK). This key is used for the PV guest dump encryption and to derive the CCK-derived extension secret used for add-secret requests. Use a secure, random, plaintext AES-256 GCM key. Optional.

--enable-dump

Enable PV guest dumps. Requires the --comm-key option. Optional.

--disable-dump

Disable PV guest dumps. This is the default.

--enable-cck-extension-secret

Add-secret requests must provide an extension secret that matches the CCK-derived extension secret. Requires the --comm-key option. Optional.

--disable-cck-extension-secret

Add-secret requests don't have to provide an extension secret. This is the default.

--enable-pckmo

Enable the support for the DEA, TDEA, AES, and ECC PCKMO key encryption functions. This is the default.

--disable-pckmo

Disable the support for the DEA, TDEA, AES, and ECC PCKMO key encryption functions. Optional.

-v,  --version

Prints version information, then exits.

Examples

These are examples to generate a protected virtualization image in /boot/vmlinuz.pv, using the kernel file vmlinuz, the initrd in initramfs, the kernel parameters contained in parmfile, the intermediate CA in DigiCertCA.crt, the IBM Z signing key in ibm-z-host-key-signing.crt, and the host-key document in host_key.crt. An AES-256 GCM key is stored in comm-key, which is used for the PV guest dump support in the second example.

Generate a protected virtualization image:

genprotimg -i vmlinuz -r initramfs -p parmfile -k host_key.crt -C ibm-z-host-key-signing.crt -C DigiCertCA.crt -o /boot/vmlinuz.pv

Generate a protected virtualization image with PV guest dump support:

genprotimg -i vmlinuz -r initramfs -p parmfile -k host_key.crt -C ibm-z-host-key-signing.crt -C DigiCertCA.crt -o /boot/vmlinuz.pv --enable-dump --comm-key comm-key

Notes

  1. An ELF file cannot be used as a Linux kernel image.
  2. Remember to re-run zipl after updating a protected virtualization image.

See Also

zipl(5), qemu(1)

Info

May 2022 s390-tools