PrintNumber ErrorLocation Error Correction DateAdded
2 px Downloading Compressed File Guest Images 146 Downloading Compressed File System Images 146 5/22/2008
2 pxi Label Option 173 Label should be in mono 5/22/2008
2 pxix Appendix C: Xend Configuration Parameter 537
Appendix D: Guest Configuration Parameter 541
Appendix C: Xend Configuration Parameters 537
Appendix D: Guest Configuration Parameters 541
5/22/2008
2 p13 Under Advantages:
Requires the same OS and patch level on all virtualized machines (homogeneous computing infrastructure).
should be under disadvantages 5/22/2008
2 p15 In the 1990s, the Disco project at Stanford led by Mendel Rosemblum used virtual machines to allow commodity operating systems to run on nonuniform memory access computer (NUMA) hardware. In the 1990s, the Disco project at Stanford led by Mendel Rosemblum used virtual machines to allow commodity operating systems to run on nonuniform memory access (NUMA) computer hardware. 5/22/2008
2 p24 VEs are also referred to as VPSs, or virtual private servers, as is the case with the Linux-VServer project. VEs are also referred to as VPSes, or virtual private servers, as is the case with the Linux-VServer project. 5/22/2008
2 p25 Because the discussion here has made the case for selecting Xen as a virtualization platform, because the discussion here has made the case for selecting Xen as a virtualization platform. Because the discussion here has made the case for selecting Xen as a virtualization platform, the remainder of this book focuses exclusively on Xen. 5/22/2008
2 p50 However, within the guest domains, we still want the operating system to run at a higher privilege level that the user level applications. However, within the guest domains, we still want the operating system to run at a higher privilege level than the user level applications. 5/22/2008
2 p56-57 Table 3.2 under Option:
boot option"
apic=es7000
apic=summit"
apic=es7000
apic=summit
delete 5/22/2008
2 p58 Table 3.2 under Description:
Xen output can be sent to the serial
Typically ports, com1 and com2.
this is done for debugging purposes.
Xen output can be sent to the serial ports, com1 and com2. Typically,
this is done for debugging purposes.
5/22/2008
2 p59 The GRUB configuration file from the Xen LiveCD did not use many of options described in Tables 3.2 and 3.3 (only the watchdog option). The GRUB configuration file from the Xen LiveCD did not use many of the options described in Tables 3.2 and 3.3 (only the watchdog option). 5/22/2008
2 p62 [root@dom0]#killall xenstored xenconsoled

[root@dom0]#rm –rf /var/lib/xenstored/*

[root@dom0]#xend status
[root@dom0]# killall xenstored xenconsoled

[root@dom0]# rm –rf /var/lib/xenstored/*

[root@dom0]# xend status
5/22/2008
2 p66 Table 3.4 cont. 2nd entry Possible Values:

and network-nat

commas wrong font
network-nat, <customscript>

fixed
5/22/2008
2 p68 The /vm and /local/domain directory paths have subareas dedicated to individual domains, while the /tool path stores general information about various tools and is not indexed by domain. The second directory level in /local/domain might seem somewhat unnecessary given that /local contains only the domain subdirectory.
Each domain has two identification numbers. The universal unique identifier (UUID) is an identifying number that remains the same even if the guest is migrated to another machine.
The /vm and /local/domain directory paths have subareas dedicated to individual domains, while the /tool path stores general information about various tools and is not indexed by domain. The second directory level in /local/domain might seem somewhat unnecessary given that /local contains only the domain subdirectory.
Each domain has two identification numbers. The universally unique identifier (UUID) is an identifying number that remains the same even if the guest is migrated to another machine.

(directory not in mono now)
5/22/2008
2 p72 xenstore-chmod <XenStore
Path> <mode.
xenstore-chmod <XenStore
Path> <mode>
5/22/2008
2 p77 To support unmodified DomainU guests such as Windows guests, you need a process with virtualization extensions built in such as Intel VT or AMD SVM support. To support unmodified DomU guests such as Windows guests, you need a process with virtualization extensions built in such as Intel VT or AMD SVM support. 6/17/2008
2 p78 One way to check if your processor is AMD-V capable from a Linux system is to check the output of the /proc/cpunfo for an svm flag. If the flag is present, you likely have an AMD-V processor. One way to check if your processor is AMD-V capable from a Linux system is to check the output of the /proc/cpuinfo for an svm flag (To check for VT-x, look for the VMX flag). 6/17/2008
2 p79 However, live migration is for the DomainU guests. However, live migration is for the DomU guests. 6/17/2008
2 p80 Additionally, you may want to ensure that your Domain0 kernel includes support for ethernet bridging and loopback, if you want your DomainU kernels to obtain /dev/ethX devices. If your host kernel doesn’t support bridging, or bridging does not work for you, you can select the alternate means of using IP routing in Domain0. This approach can also be useful if you want to isolate your DomainU guests from any external networks. Additionally, you may want to ensure that your Domain0 kernel includes support for ethernet bridging and loopback, if you want your DomU kernels to obtain ethX devices. If your host kernel doesn’t support bridging, or bridging does not work for you, you can select the alternate means of using IP routing in Domain0. This approach can also be useful if you want to isolate your DomU guests from any external networks. 6/17/2008
2 p84 Table 4.2 Recap of Xen-Enabled Free and Open Source Operating System Distributions

1st para: The bulk of compatibility issues relate to the choice glibc thread local storage (tls) implementation, or the distribution’s choice of a device file system, either devfs or udev.
Table 4.2 Summary of Xen-Enabled Free and Open Source Operating System Distributions

1st para: The bulk of compatibility issues relate to the choice of glibc thread local storage (tls) implementation, or the distribution’s choice of a device file system, either devfs or udev.
6/17/2008
2 p94 Second, the xen-kernel package provides the Domain0/DomainU kernel and dependencies, and updates the GRUB boot menu appropriately. Second, the xen-kernel package provides the Domain0/DomU kernel and dependencies, and updates the GRUB boot menu appropriately. 6/17/2008
2 p101 From there we need to install a few extra packages that will make our Ubuntu guest a fully functioning Domain0. From there we need to install a few extra packages that will make our Ubuntu system a fully functioning Domain0. 6/17/2008
2 p107 Sdl—Support for Simple Direct Lay media library, which enables faster -DomainU console drawing

Vnc—Enables support for VNC as a video device for DomainU
Sdl—Support for Simple Direct Lay media library, which enables faster -DomU console drawing

Vnc—Enables support for VNC as a video device for DomU
6/17/2008
2 p108 While we are enabling packages, we will also enable xend and the xen-tools; this completes the list of all the required packages for Xen.

xen-tools should be in mono
fixed 6/17/2008
2 p110 splashimage=(hd0,0)/b oot/grub/splash.xpm.gz splashimage=(hd0,0)/boot/grub/splash.xpm.gz 6/17/2008
2 p111 Listing 4.21 remove top blank line. fixed 6/17/2008
2 p116 3 references to DomainU

...contains only the virtual drivers to talk to your Domain0.
Should be DomU

...contains only the virtual drivers to talk to your DomU.
6/18/2008
2 p118 ...demonstrating precisely how to put this infrastructure to work by obtaining preconfigured guest (DomainU) instances that will enable you to really put your system to use ...demonstrating precisely how to put this infrastructure to work by obtaining preconfigured guest (DomU) instances that will enable you to really put your system to use 6/18/2008
2 p123 (A tuple is an ordered list of items. A three-tuple has three list items) . (A tuple is an ordered list of items. A three-tuple has three list items). 6/18/2008
2 p124 Other possible prefixes used to export real or virtual devices are tap:aio, tap:qcow and file:.

ending period should NOT be bold or mono.

The xvd interface exploits this knowledge to achieve better performance.
Other possible prefixes used to export real or virtual devices are tap:aio, tap:qcow and file:.

Delete sentence
6/18/2008
2 p126 Listing 5.3: extra space after line fixed 6/18/2008
2 p126 Listing 5.3: extra space after line

(or directory within /dev).

.../ev/xvda, and it will have write access to the device.

fixed

(or a directory within /dev).

.../dev/xvda, and it will have write access to the device.
6/18/2008
2 p130 ...Debian 4.0, Fedora 8, Gentoo 20071,...

...Debian 4.0, Fedora 8, Gentoo 2007.1,... 6/18/2008
2 p131 Each project can provide the guest image types to make publically available.

Yet mounting prebuilt images and partition images involves a different process than typically used when mounting a physical block device such as a physical disk or partition. To complicate things further, the mechanisms to mount a disk partition image and a disk image differ from one another.

Each project can choose the guest image types to make publically available.

Yet mounting prebuilt disk and partition images involves a different process than typically used when mounting a physical block device such as a physical disk or partition. To complicate things further, the mechanisms to mount a partition image and a disk image differ from one another.
6/18/2008
2 p138 Then we use mount with the -o loop option to specify the loop option that mounts the source on a loopback device.

first loop should be mono
Then we use mount with the -o loop option to specify the loop option that mounts the source on a loopback device. 6/18/2008
2 p139 We use the copy command with the -r option to...

The cp command uses 'uname –r' to obtain the release of the current running kernel,...
We use the cp command with the -r option to...

The cp command uses `uname –r` to obtain the release of the current running kernel,...
6/18/2008
2 p141 Listing 5.21 shows the command to actually move the Debian partition image to the directory. We use the mv command to move the guest partition image to /xen/images/. Listing 5.21 shows the command to actually move the Debian partition images to the directory. We use the mv command to move the guest partition images to /xen/images/. 6/18/2008
2 p141 Listing 5.21 Moving the Guest Partition Image File into Place
[root@dom0]# mv debian.3-1.img /xen/images/
Listing 5.21 Moving the Guest Partition Images Files into Place
[root@dom0]# mv debian.3-1.img debian.swap /xen/images/
6/18/2008
2 p141 The changes needed to get the Debian guest to boot are some optimization, such as changing the disk to xvda instead of sda. The listing includes the changes needed to get the Debian guest to boot and some optimization, such as changing the disk to xvda instead of sda. 6/18/2008
2 p144 End—The fourth column is the ending block on disk where the partition starts. End—The fourth column is the ending block on disk where the partition ends. 6/18/2008
2 p160 We use xvd disks for better performance. delete sentence 6/18/2008
2 p174 Specifically, there must be a disk image for the guest, an acceptable kernel image, a configuration file to specify parameters for guest creation, and sufficient available resources for new guests. Specifically, there must be a guest image, an acceptable operating system kernel, a configuration file to specify parameters for guest creation, and sufficient available resources for new guests. 6/18/2008
2 p174 Disk images—A disk image for the guest includes all programs necessary for a working operating system and any services necessary for the purpose of the guest domain (such as Apache servers). Guest images—A guest image includes all programs necessary for a working operating system and any services necessary for the purpose of the guest domain (such as Apache servers). 6/18/2008
2 p174 Kernel—The kernel for... Operating system kernel—The kernel for... 6/18/2008
2 p179 To see a description of all the possible options see Appendix C, “Xend Configuration Parameter.” To see a description of all the possible options see Appendix D, “Guest Configuration Parameters.” 6/18/2008
2 p180 ...new guest in ./proc/cmdline, which is a simple text file. ...new guest in /proc/cmdline, which is a simple text file. 6/18/2008
2 p181 Listing 6.22, 2nd line:
--path=/xen/images/:/etc/xen/auto
--path=/xen/:/etc/xen/auto 6/18/2008
2 p182 xm searched for a file called generic-guest.cfg in the /xen/images/ directory. xm searched for a file called generic-guest.cfg in the /xen directory. 6/18/2008
2 p191 Guest configuration files in /etc/xen/auto are started automatically—whenever the xendomains script is started at system boot if the xendomains init script is enabled or after boot. The contents of /etc/xen/auto should be symlinks to guest configuration files. Guest configuration files in /etc/xen/auto/ are started automatically—whenever the xendomains script is started at system boot if the xendomains init script is enabled or after boot. The contents of /etc/xen/auto/ should be symlinks to guest configuration files. 6/18/2008
2 p196 Listing 6.53 Messages Printed from within a Guest When Guest Is Shut Down from Domain Listing 6.53 Messages Printed from within a Guest When Guest Is Shut Down from Domain0 6/18/2008
2 p212 It can then be disabled after a remote access service has been configured; however, SDL may need to be reenabled should problems with booting the guest occur prior to the starting of services installed on the guest; or VNC should be considered instead. It can then be disabled after a remote access service has been configured; however, SDL may need to be re-enabled should problems with booting the guest occur prior to the starting of services installed on the guest; or VNC should be considered instead. 6/18/2008
2 p226 ...and typing vnc <ipaddress>, where IP address is the IP of your virtual guest. ...and typing vncviewer <ipaddress>, where IP address is the IP of your virtual guest. 6/18/2008
2 p237 ...that is disposable, as the installer will format erase the data on that partition. ...that is disposable, as the installer will erase the data on that partition. 6/18/2008
2 p244 The Unbuntu and Debian mirrors and are configured in the standard /etc/apt/sources.list file. The Ubuntu and Debian mirrors and are configured in the standard /etc/apt/sources.list file. 6/18/2008
2 p244 Listing 7.14, 1st line:
http://archive.ubuntu.
move to the next line 6/18/2008
2 p248 Listing 7.19, 2nd line:
[root@dom0]# wget \ ftp://mirror.iawnet.sandia.gov/pub/gentoo/releases/x86/
[root@dom0]# wget ftp://mirror.iawnet.sandia.gov/pub/gentoo/releases/x86/ 6/18/2008
2 p248 Listing 7.23, 3rd line:
[Debootstrap output omitted]
[emerge output omitted] 6/18/2008
2 p252 As always, when masking software, understand the ramifications of doing so before proceeding. As always, when unmasking software, understand the ramifications of doing so before proceeding. 6/18/2008
2 p273 An example configuration file was shown previously in Listing 7.45. delete sentence 6/18/2008
2 p289 Listing 8.16, 8th line:
tar zxvf iscsitarget-0.4.15.tar.gz
tar zxf iscsitarget-0.4.15.tar.gz 6/18/2008
2 p291 Listing 8.19, 2nd and 3rd lines:
[root@dom0]# tar xzvf open-iscsi-2.0-865.15.tar.gz
[tar output omitted]
[root@dom0]# tar zxf open-iscsi-2.0-865.15.tar.gz
6/18/2008
2 p294 Listing 8.23
[root@dom0]# tar xzpf vblade-14.tgz
[root@dom0]# cd vblade-14/
[root@dom0]# make

[output omitted]

[root@dom0]# make install

[output omitted]
[root@aoe-server]# tar xzpf vblade-14.tgz
[root@aoe-server]# cd vblade-14/
[root@aoe-server]# make

[output omitted]

[root@aoe-server]# make install

[output omitted]
6/18/2008
2 p294 So for the example shown in Listing 8.24, vblade uses shelf 1, slot 1, and eth0. So for the example shown in Listing 8.24, vblade uses shelf 1, slot 1, eth0, and /dev/sda. 6/18/2008
2 p294 Listing 8.24, 1st line:
[root@dom0]# vblade 1 1 eth0 /dev/sda
[root@aoe-server]# vblade 1 1 eth0 /dev/sda
6/18/2008
2 pp298-299 Listing 8.32 and 8.34: remove extra blank line

...is written back to the server and any cache copies on other machines are refreshed.
fixed

...is written back to the server and any cached copies on other machines are refreshed.

6/18/2008
2 p312 Listing 8.51
[user@dom0]$ dd if=/dev/zero of=guest_partition_sparse.img bs=1k seek=4096k
[user@dom0]$ dd if=/dev/zero of=guest_partition_sparse.img bs=1k seek=4096k \

6/18/2008
2 p314 When we used fdisk earlier in this chapter, we made the first partition swap and the second partition ext2, so we will mount the second partition. If we are working with a disk that we do not know the partition table structure of, we can use the fdisk command to list the partitions (see Listing 8.56 for an example). Notice that we mount the second partition with lomount, because this is our ext2 partition; the first partition is a swap partition.
Listing 8.55 Mount the Guest Disk Image on the Loopback Device
[root@dom0]# mkdir -p /mnt/guest_image/
[root@dom0]# lomount -t ext2 -diskimage guest_disk_sparse.img -partition 2 /mnt/
When we used fdisk earlier in this chapter, we made the first partition swap and the second partition ext3, so we will mount the second partition. If we are working with a disk that we do not know the partition table structure of, we can use the fdisk command to list the partitions (see Listing 8.56 for an example). Notice that we mount the second partition with lomount, because this is our ext3 partition; the first partition is a swap partition.
Listing 8.55 Mount the Guest Disk Image on the Loopback Device
[root@dom0]# mkdir -p /mnt/guest_image/
[root@dom0]# lomount -t ext3 -diskimage guest_disk_sparse.img -partition 2 /mnt/
6/18/2008
2 p315 Listing 8.56:
guest_disk_sparse.img1 1 63 506016 82 Linux swap / Solaris
guest_disk_sparse.img2 64 522 3686917+ 83\Linux
guest_disk_sparse.img1 1 63 506016 82 Linux swap
guest_disk_sparse.img2 64 522 3686917+ 83 Linux
6/18/2008
2 p315 Listing 8.58:
[root@dom0]# mount -o loop -t ext3 guest_partition_sparse.img \ /mnt/guest_image
[root@dom0]# mount -o loop -t ext3 guest_partition_sparse.img /mnt/guest_image 6/18/2008
2 p332 There are more domains and more pieces to the trusted computing base to manage. There are more domains and more pieces in the trusted computing base to manage. 6/18/2008
2 p341 If you have multiple physical network cards (NIC) and some guest has a need for very high-performance or high-availability network I/O, a possible enhancement is to bond the NICs in the guest. If you have multiple physical network cards and some guest has a need for very high-performance or high-availability network I/O, a possible enhancement is to bond the NICs in the guest. 6/18/2008
2 p347 Bonding the network interfaces in the guest requires the Xen virtual network driver supports. Xen developers are still working on it and it is said that this feature will be included in the next Xen release. It is definitely worth keeping track of the development of Xen bonding NICs in the xen-devel mail list. Bonding the network interfaces in the guest requires Xen virtual network driver support. Xen developers are still working on it and it is said that this feature will be included in the next Xen release. It is definitely worth keeping track of the development of Xen bonding NICs on the xen-devel mailing list. 6/18/2008
2 p347 The backend vif in the driver domain passes the data to and from the backend vif by shared buffer ring. The backend vif in the driver domain passes the data to and from the backend vif with a shared buffer ring. 6/18/2008
2 p348 When packets are sent to guest domains, the bridge or the router in the driver domain first receives the packets. It directs the packets to the proper guest domain’s backend vif, and that backend vif puts the packets to the guest domain’s frontend vif receiving buffer. The frontend vif inside the guest domain then processes the arrived packets as usual and delivers them up to the guest domain’s application. When a guest domain is to send packets to the Internet, the packets are sent to the frontend vif’s sending buffer, and then the backend vif puts the packets from the vif’s sending buffer into bridge or router in the driver domain. The bridge or router then delivers it to the Internet. When packets are sent to guest domains, the bridge or the router in the driver domain first receives the packets. It directs the packets to the proper guest domain’s backend vif, and that backend vif puts the packets in the guest domain’s frontend vif receiving buffer. The frontend vif inside the guest domain then processes the arrived packets as usual and delivers them up to the guest domain’s application. When a guest domain sends packets to the Internet, the packets are sent to the frontend vif’s sending buffer, and then the backend vif puts the packets from the vif’s sending buffer into the bridge or router in the driver domain. The bridge or router then delivers it to the Internet. 6/18/2008
2 p349 The Xen loopback device vif0.0 exists only to enforce a data copy on the guest domain to Domain0 path. The Xen loopback device vif0.0 exists only to enforce a data copy on the guest domain to the Domain0 path. 6/18/2008
2 p350 The tools ifconfig, ping, ip, and Ethereal/Wireshark can be helpful to verify or diagnose the setup of our virtual network topology, and to make sure the bridge or router are properly forwarding packets to and from the guest. The tools ifconfig, ping, ip, and Ethereal/Wireshark can be helpful to verify or diagnose the setup of our virtual network topology, and to make sure that the bridge or router is properly forwarding packets to and from the guest. 6/18/2008
2 p351 As described in Chapter 6, the Xend configuration file’s syntax is based on Simplified XML persistent(SXP) format. The scriptname is the script filename that Xen will use when xend starts. As the common configuration file syntax, the lines started with # are the comment. As described in Chapter 6, the Xend configuration file’s syntax is based on S-expression (SXP) format. The scriptname is the script filename that Xen will use when xend starts. As the common configuration file syntax, the lines starting with a # are comments. 6/18/2008
2 p352 More details on what arguments the default scripts can take are mentioned in the later sections of this chapter. More details on what arguments the default scripts can take are mentioned in later sections of this chapter. 6/18/2008
2 p353 If the directive vif does not appear in the configure file, there will be no network interfaces in the guest domain. If the directive vif does not appear in the configuration file, there will be no network interfaces in the guest domain. 6/18/2008
2 p355 Xen network script uses bridge-utils to set up the software bridge in the Linux kernel. Xen’s network bridge script uses bridge-utils to set up the software bridge in the Linux kernel. 6/18/2008
2 p361 In a guest domain, whether the Xen network is in bridging mode or routing mode, the network interface looks the same as it would in a nonvirtualized machine.
In a guest domain, whether the Xen network is in bridging mode or routing mode, the network interface looks the same as it would in a non-virtualized machine.
6/18/2008
2 p372 From the first entry, we can tell that any packets that send to the host 128.153.144.96 will send to the guest domain’s backend interface vif1.0, which will then pass it to the guest frontend. From the second entry, we can tell that for all the packets sent to a host in the subnet 128.153.144.0, it will send to the interface eth0 in the driver domain. The last entry means the packets that send to any other IPs will be forwarded to the outside through the driver domain’s gateway 128.153.144.1. From the first entry, we can tell that any packets sent to the host 128.153.144.96 will be sent to the guest domain’s backend interface vif1.0, which will then pass it to the guest frontend. From the second entry, we can tell that for all the packets sent to a host in the subnet 128.153.144.0, it will send to the interface eth0 in the driver domain. The last entry means the packets sent to any other IPs will be forwarded to the outside through the driver domain’s gateway 128.153.144.1. 6/18/2008
2 p389 By looking for the 00:16E prefix, we can tell whether it is a Xen guest domain’s virtual NIC or a real physical vendor NIC. By looking for the 00:16:3E prefix, we can tell whether it is a Xen guest domain’s virtual NIC or a real physical vendor NIC. 6/18/2008
2 p391 As in bridging mode, the guest domain interacts with the driver domain at the Data Link layer lower than IP layer, so how the guest domain in bridging mode obtains an IP address depends on how it is decided inside the guest domain. As in bridging mode, the guest domain interacts with the driver domain at the Data Link layer, lower than the IP layer, so how the guest domain in bridging mode obtains an IP address depends on how it is decided inside the guest domain. 6/18/2008
2 p391 However, the guest domain can obtain the IP from the DHCP server set up inside the driver domain. However, the guest domain can obtain the IP from a DHCP server set up inside the driver domain. 6/18/2008
2 p392 For further details, please refer to the IETF/RFC1918 standard; its link is provided in the recommendation and reference section. For further details, please refer to the IETF/RFC1918 standard; its link is provided in the References and Further Reading section. 6/18/2008
2 p394 The DHCP server in the driver domain should be configured properly and run to allocate the IPs with the network segment where the driver domain lays. The DHCP server in the driver domain should be configured properly and run to allocate the IPs with the network segment where the driver domain lies. 6/18/2008
2 p396 One is eth0, assigned a static IP address and a user-defined MAC address and attached to the virtual network xenbr0. One is eth0, assigned a user-defined MAC address and attached to the virtual network xenbr0. 6/18/2008
1 p398 The command xm network-list releases all the virtual device information of a guest domain stored in the XenStore space. The command xm network-list displays all the virtual device information of a guest domain stored in the XenStore space. 6/18/2008
2 p398 As the xm network-detach subcommand is broken, the fourth vif setup will fail without any notice because only three network interfaces are allowed. As the xm network-attach subcommand has a bug, the fourth vif setup will fail without any notice because only three network interfaces are allowed. 6/18/2008
2 p399 Now Xen also tries to provide a similar feature for the guest domains in different driver domains. Xen also provides a similar feature for the guest domains in different driver domains. 6/18/2008
2 p402 Table 10.5vnet Configuration Directives
Suboption Arguments Description
id vnetid vnetid is to identify the vnet.
Vnetid is a 128-bit identifier: (ffff:ffff:ffff:fffff:ffff:ffff:ffff:ffff)
Or a short form looks like ffff, which means
(0:0:0:0:0:0:0:ffff); 0 is not allowed and 1 is reserved.
bridge <bridge> Define the vnet bridge name:
v net will be a bridge-mode network, the virtual machines are contained in the vnet by attaching vif to this bridge.
vnetif <vnet_interface> Define the vif name of vnet; it is optional. Translate the vnet packets over the network.
security <level> Packets encryption level:
None: no encryption of the packets over the vnet.
Auth: authenticate required.
Conf: authenticate and packets encrypted.
Table 10.5vnet Configuration Directives
Suboption Arguments Description
id vnetid vnetid is to identify the vnet.
vnetid is a 128-bit identifier: (ffff:ffff:ffff:fffff:ffff:ffff:ffff:ffff)
Or a short form looks like ffff, which means
(0:0:0:0:0:0:0:ffff); 0 is not allowed and 1 is reserved.
bridge <bridge> Define the vnet bridge name:
vnet will be a bridge-mode network, the virtual machines are contained in the vnet by attaching vif to this bridge.
vnetif <vnet_interface> Define the vif name of vnet; it is optional. Translate the vnet packets over the network.
security <level> Packets encryption level:
None—no encryption of the packets over the vnet.
Auth—authenticate required.
Conf—authenticate and packets encrypted.
6/18/2008
2 p397 Table 10.3 dev_id wrong font fixed 6/18/2008
2 p408 Of course, if the attacker gains control of DomU, it can use that domain as a launching pad for other attacks. Of course, if the attacker gains control of a DomU, it can use that domain as a launching pad for other attacks. 6/19/2008
2 p413 Iptables project uses both a kernel side element and a user space element. The iptables project uses both a kernel side element and a user space element. 6/19/2008
2 p414 If you build it as a module, be sure to add the module to the list of modules installed at bootup. If you build it as a module, be sure to add the module to the list of modules loaded at bootup. 6/19/2008
2 p419 Listing 11.11 Downloading and Building pcap
[root@dom0]# wget http://www.tcpdump.org/release/libpcap-0.9.5.tar.gz
[output omitted]
[root@dom0]# tar –xpzf libpcap-0.9.5.tar.gz[root@dom0]# cd libpcap-0.9.5[root@dom0]#./configure
[output omitted]
[root@dom0]# make
[output omitted]
[root@dom0]# make install
Listing 11.11 Downloading and Building pcap
[root@dom0]# wget http://www.tcpdump.org/release/libpcap-0.9.5.tar.gz
[root@dom0]# tar –xpzf libpcap-0.9.5.tar.gz
[root@dom0]# cd libpcap-0.9.5
[root@dom0]#./configure
[root@dom0]# make
[root@dom0]# make install
6/19/2008
2 p430 This is done simply by using the xm command with the dmesg flag as shown in Listing 11.23.
This is done simply by using the xm command with the dmesg subcommand as shown in Listing 11.23.
6/19/2008
2 p474 Listing 13.1: remove extra blank line
fixed
6/19/2008
2 p476 Listing 13.7: remove extra blank line
fixed
6/19/2008
2 p486 Listing 13.17: remove extra blank line
fixed
6/19/2008
2 p487 Stray continuation character removed
fixed
6/19/2008
2 p492 Listing 13.23: remove extra blank line
fixed
6/19/2008
2 p504 Virtual Iron competes directly with Vmware. An often repeated point regarding Virtual Iron is its ability to provide a comparable solution to VMWare’s ESX Server product at approximately one-fifth the cost. Virtual Iron competes directly with VMware. An often repeated point regarding Virtual Iron is its ability to provide a comparable solution to VMware’s ESX Server product at approximately one-fifth the cost. 6/19/2008
2 p514 Source Forge is a Web site detected to hosting open source projects of all kinds. Source Forge is a Web site dedicated to hosting open source projects of all kinds. 6/19/2008
2 p531 For more details on the xm command, see the xm main page.
For more details on the xm command, see the xm man page.
6/19/2008
2 p537 Appendix C title:
Xend Configuration Parameter
Xend Configuration Parameters 6/19/2008
2 p537 Table C.1:
The optional values are DEBUG, ERROR, INFO, CRITICAL, and WARNING.
The options for values are DEBUG, ERROR, INFO, CRITICAL, and WARNING. 6/19/2008
2 p537 Table C.3, 2nd row:
Alignment off
fixed 6/19/2008
2 p541 Appendix D title:
Guest Configuration Parameter
Guest Configuration Parameters 6/19/2008
2 p545 When Xen was first released, the Clarkson group carried out a repeated research effort on Xen to compare and validate the Xen’s performance. When Xen was first released, the Clarkson group carried out a repeated research effort on Xen to compare and validate Xen’s performance. 6/19/2008