On the KVM host, create a domain configuration-XML for the virtual machines that are to run in IBM SEL mode.
Before you begin
You need a bootable disk image that is encrypted with the public host key of the mainframe on
which you want to run it. See Preparing the boot image.
On an IBM z17 and using a Linux kernel that supports the sysfs entries, you can check
that a system is able to run the guest before you start the virtual server and the guest. The
following sysfs files are provided under /sys/firmware/uv/keys:
host_key - the SHA256 hash of the current host key of the system
backup_host_key - the SHA256 hash of the backup host key of the system
all - the complete payload (480 bytes = up to 15 hashes) of the
corresponding UVC
Read one of the files to, for example, inspect the current host-key
hash:
For example, this setting makes the required bounce buffer for virtio
devices the default and you do not have to specify it explicitly for each device. This setting also
leads to warning messages if the CPU model of the virtual server does not include all features that
are required by IBM SEL.
Manual domain-XML configuration
If the output of the virsh domcapabilities command shows that you
do not have support for the launchSecurity element, you must configure the domain XML manually:
Ensure that the XML has iommu="on" set to allow the use of
bounce buffers on every element that represents a virtio device, for example, the
<disk>, <serial>, and
<interface> elements.
Do not define a memory balloon device for secure guests. Use the following definition in the
guest XML:
<memballoon model='none'/>
For example, the following domain configuration-XML, called secguest1.xml, configures a virtual machine called secguest1 that
allows bounce buffers: