X-Git-Url: http://git.annexia.org/?a=blobdiff_plain;f=src%2Fguestfs.pod;h=7cf4e0b9ca3504e1500b0b493b067336c500bcd5;hb=c1592ac93886e7f39a6017272b2486d3f411d054;hp=b50f608959960561b2b3e2b3b09ba726e6d790e3;hpb=cd96cca38cea638a6db76afceeed76babc9e763c;p=libguestfs.git diff --git a/src/guestfs.pod b/src/guestfs.pod index b50f608..7cf4e0b 100644 --- a/src/guestfs.pod +++ b/src/guestfs.pod @@ -576,7 +576,9 @@ inspection and caches the results in the guest handle. Subsequent calls to C return this cached information, but I re-read the disks. If you change the content of the guest disks, you can redo inspection by calling L -again. +again. (L works a little +differently from the other calls and does read the disks. See +documentation for that function for details). =head2 SPECIAL CONSIDERATIONS FOR WINDOWS GUESTS @@ -1093,6 +1095,14 @@ data. Callers should be careful to escape these before printing them to a structured file (for example, use HTML escaping if creating a web page). +Guest configuration may be altered in unusual ways by the +administrator of the virtual machine, and may not reflect reality +(particularly for untrusted or actively malicious guests). For +example we parse the hostname from configuration files like +C that we find in the guest, but the guest +administrator can easily manipulate these files to provide the wrong +hostname. + The inspection API parses guest configuration using two external libraries: Augeas (Linux configuration) and hivex (Windows Registry). Both are designed to be robust in the face of malicious data, although @@ -2078,6 +2088,7 @@ L, L, L, L, +L, L, L, L,