table of contents
GENPROTIMG(1) | Genprotimg Manual | GENPROTIMG(1) |
NAME¶
genprotimg - Create an IBM Secure Execution image
SYNOPSIS¶
genprotimg [OPTIONS] --kernel <FILE> --output <FILE> --host-key-document <FILE> <--no-verify|--cert <FILE>>
DESCRIPTION¶
Use genprotimg to generate a single bootable image file with encrypted and integrity-protected parts. The command requires a kernel image, a host-key document, certificates for the host-key document verification, and an output file name. Optionally, specify an initial RAM filesystem, and a file containing the kernel parameters. If the command should be run offline, use the --offline option and specify the certificate revocation lists (CRLs) by using the --crl option. Should special circumstances require it, you can optionally specify your own keys for the encryption by using the experimental options. For all certificates, CRLs, and host-key documents, both the PEM and DER input formats are supported. In the resulting image file, a plain text boot loader, the encrypted components for kernel, initial RAM disk, kernel parameters, and the encrypted and integrity-protected header are concatenated. The header contains metadata necessary for running the guest in protected mode.
Use this image file as a kernel image for zipl or for a direct kernel boot using QEMU.
OPTIONS¶
-i, --kernel, --image <FILE>
-r, --ramdisk <FILE>
-p, --parmfile <FILE>
-o, --output <FILE>
-k, --host-key-document <FILE>
--no-verify
-C, --cert <FILE>
--crl <FILE>
--offline
--root-ca <ROOT_CA>
--no-component-check
--overwrite
--cck, --comm-key <FILE>
--hdr-key <FILE>
--enable-dump
--disable-dump
--enable-cck-extension-secret
--disable-cck-extension-secret
--enable-pckmo
--disable-pckmo
--enable-pckmo-hmac
--disable-pckmo-hmac
--enable-backup-keys
--disable-backup-keys
--enable-image-encryption
--disable-image-encryption
-v, --verbose
-q, --quiet
--version
-h, --help
EXIT STATUS¶
- 0 - Program finished successfully
- The command was executed successfully.
- 1 - Generic error
- Something went wrong during the operation. Refer to the error message.
- 2 - Usage error
- The command was used incorrectly, for example: unsupported command line flag, or wrong number of arguments.
EXAMPLES¶
These are examples of how to generate an IBM Secure Execution image in /boot/secure-linux, using the kernel file /boot/vmlinuz, the initrd in /boot/initrd.img, the kernel parameters contained in parmfile, the intermediate CA in DigiCertCA.crt, the IBM Z signing key in ibm-z-host-key-signing.crt, and the host-key document in host_key.crt. An AES-256 GCM key is stored in comm-key, which is used when creating a Secure Execution image with guest dump support enabled in the second example.
Generate an IBM Secure Execution image:
genprotimg -i /boot/vmlinuz -r /boot/initrd.img -p parmfile -k host_key.crt -C ibm-z-host-key-signing.crt -C DigiCertCA.crt -o /boot/secure-linux
Generate an IBM Secure Execution image with Secure Execution guest dump support:
genprotimg -i /boot/vmlinuz -r /boot/initrd.img -p parmfile -k host_key.crt -C ibm-z-host-key-signing.crt -C DigiCertCA.crt -o /boot/secure-linux --enable-dump --cck comm-key
NOTES¶
- 1.
- The genprotimg(1) command is a symbolic link to the pvimg-create(1) command.
- 2.
- An ELF file cannot be used as a Linux kernel image.
- 3.
- Remember to re-run zipl after updating an IBM Secure Execution image.
SEE ALSO¶
pvimg-create(1) zipl(8) qemu(1)
2024-12-19 | s390-tools |