X-Git-Url: http://git.annexia.org/?a=blobdiff_plain;f=src%2Fguestfs.pod;h=fc58f4f1f04129b6063529f7da4c0ba19e843ae5;hb=refs%2Ftags%2F1.7.10;hp=b50f608959960561b2b3e2b3b09ba726e6d790e3;hpb=cd96cca38cea638a6db76afceeed76babc9e763c;p=libguestfs.git diff --git a/src/guestfs.pod b/src/guestfs.pod index b50f608..fc58f4f 100644 --- a/src/guestfs.pod +++ b/src/guestfs.pod @@ -576,7 +576,9 @@ inspection and caches the results in the guest handle. Subsequent calls to C return this cached information, but I re-read the disks. If you change the content of the guest disks, you can redo inspection by calling L -again. +again. (L works a little +differently from the other calls and does read the disks. See +documentation for that function for details). =head2 SPECIAL CONSIDERATIONS FOR WINDOWS GUESTS @@ -1093,6 +1095,14 @@ data. Callers should be careful to escape these before printing them to a structured file (for example, use HTML escaping if creating a web page). +Guest configuration may be altered in unusual ways by the +administrator of the virtual machine, and may not reflect reality +(particularly for untrusted or actively malicious guests). For +example we parse the hostname from configuration files like +C that we find in the guest, but the guest +administrator can easily manipulate these files to provide the wrong +hostname. + The inspection API parses guest configuration using two external libraries: Augeas (Linux configuration) and hivex (Windows Registry). Both are designed to be robust in the face of malicious data, although