Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be available on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 592382 - Small typo: xend mentioned instead of kvm in RHEL 6 beta Virtualization Guide
Summary: Small typo: xend mentioned instead of kvm in RHEL 6 beta Virtualization Guide
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: doc-Virtualization_Administration_Guide
Version: 6.1
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: Christopher Curran
QA Contact: ecs-bugs
Depends On:
TreeView+ depends on / blocked
Reported: 2010-05-14 17:46 UTC by Justin Clift
Modified: 2011-12-06 01:04 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2010-08-31 04:23:30 UTC
Target Upstream Version:

Attachments (Terms of Use)

Description Justin Clift 2010-05-14 17:46:08 UTC
Description of problem:

"xend" is mentioned in the RHEL 6 beta (April 2010) Virtualization Guide where it should probably say KVM instead:


  29.3. Troubleshooting with serial consoles
  "logging output with xend is unavailable"

Comment 2 Christopher Curran 2010-05-19 01:02:19 UTC
Fixed in build 21. This fix should be live soon.


Comment 3 Justin Clift 2010-05-21 10:52:16 UTC
Hi Chris,

Same problem here:


Mentions of Xen and dom0:

  The host, in the Xen hypervisor, is a privileged domain that handles system
  management and manages all virtual machines. If the host is insecure, all
  other domains in the system are vulnerable.

  + Use a firewall to restrict traffic to dom0. You can setup a firewall with
    default-reject rules that will help secure attacks on dom0. It is also
    important to limit network facing services.

  + Do not allow normal users to access dom0. If you do permit normal users dom0
    access, you run the risk of rendering dom0 vulnerable. Remember, dom0 is
    privileged, and granting unprivileged accounts may compromise the level of

Do you want this filed as a separate bug, or is here ok?

Comment 4 Justin Clift 2010-05-21 11:04:00 UTC
Similar here:


  5. Set the correct SELinux type for the Xen folder.

     semanage fcontext -a -t xen_image_t "/virtualization(/.*)?"

     Alternatively, set the correct SELinux type for a KVM folder.

     semanage fcontext -a -t virt_image_t "/virtualization(/.*)?"

Is it worth swapping the Xen and KVM entries around, for first emphasis on KVM?

Comment 5 Justin Clift 2010-05-21 12:01:52 UTC
This looks like a carry over from RHEL 5 as well:


  "The Boolean parameter xend_disable_t can set the xend to unconfined mode after restarting the daemon. It is better to disable protection for a single daemon than the whole system. It is advisable that you should not re-label directories as xen_image_t that you will use elsewhere."

Comment 6 RHEL Program Management 2010-06-07 15:54:24 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux major release.  Product Management has requested further
review of this request by Red Hat Engineering, for potential inclusion in a Red
Hat Enterprise Linux Major release.  This request is not yet committed for

Note You need to log in before you can comment on or make changes to this bug.