X-Git-Url: http://git.annexia.org/?p=libguestfs.git;a=blobdiff_plain;f=src%2Fguestfs.pod;h=3f40d7658fcb3466b141dfccfc9e596ae4e998d7;hp=83709827d3d832e9a531e61b7be805cede018ac5;hb=086bd1f7bfab4c10d890ecca3506a1b091c0d398;hpb=163be3d72a3f3dc902bcd0856d8aec448bc7907f diff --git a/src/guestfs.pod b/src/guestfs.pod index 8370982..3f40d76 100644 --- a/src/guestfs.pod +++ b/src/guestfs.pod @@ -52,6 +52,9 @@ need enough permissions to access the disk images. Libguestfs is a large API because it can do many things. For a gentle introduction, please read the L section next. +There are also some example programs in the L +manual page. + =head1 API OVERVIEW This section provides a gentler overview of the libguestfs API. We @@ -654,7 +657,7 @@ with libguestfs. =item B -For documentation see the file C. +For documentation see L. =item B @@ -1095,6 +1098,14 @@ data. Callers should be careful to escape these before printing them to a structured file (for example, use HTML escaping if creating a web page). +Guest configuration may be altered in unusual ways by the +administrator of the virtual machine, and may not reflect reality +(particularly for untrusted or actively malicious guests). For +example we parse the hostname from configuration files like +C that we find in the guest, but the guest +administrator can easily manipulate these files to provide the wrong +hostname. + The inspection API parses guest configuration using two external libraries: Augeas (Linux configuration) and hivex (Windows Registry). Both are designed to be robust in the face of malicious data, although @@ -2075,11 +2086,14 @@ enough. =head1 SEE ALSO +L, +L, L, L, L, L, L, +L, L, L, L,