similar to: [PATCH] Fix inspection code when PCRE or hivex is missing.

Displaying 20 results from an estimated 400 matches similar to: "[PATCH] Fix inspection code when PCRE or hivex is missing."

2012 Aug 29
5
[PATCH 0/4] Add hivex APIs into the libguestfs API (RHBZ#852394)
This adds most of the hivex APIs directly to the libguestfs API, so that you can read and write Windows Registry hive files from libguestfs without needing to download and upload hive files from the guest. This is analogous to how Augeas APIs are exposed already (guestfs_aug_*) Also, inspection is now done using the new APIs, which fixes the following bug:
2015 Feb 14
2
[PATCH 0/2] Change guestfs__*
libguestfs has used double and triple underscores in identifiers. These aren't valid for global names in C++. (http://stackoverflow.com/a/228797) These large but completely mechanical patches change the illegal identifiers to legal ones. Rich.
2012 Nov 01
2
[PATCH 0/2] New inspect_list_applications2 API
Here's the new API method and update to virt-inspector. I still need to implement app_arch for debian and windows (if applicable), for now they just return empty strings.
2011 Oct 13
9
[PATCH 1/9] Partially fix --disable-erlang
From: Michael Scherer <misc at zarb.org> Without this, configure will always enable erlang, no matter what argument are passed. Now, we can disable it, even if configure still need the erlang compiler for some obscure reason. --- configure.ac | 10 ++++++---- 1 files changed, 6 insertions(+), 4 deletions(-) diff --git a/configure.ac b/configure.ac index 337a3ed..e0bed2f 100644 ---
2012 Mar 19
0
[PATCH] inspection: Set last errno to ENOTSUP when inspection APIs are not available.
From: "Richard W.M. Jones" <rjones at redhat.com> Previously there was no programmatic way to tell if inspection APIs were unavailable because they are not compiled in (because hivex isn't around). This contrasts with daemon APIs where the availability is covered by the guestfs_available API. Change the inspection APIs so that when they are not available, the last errno is
2012 Nov 01
4
[PATCH v2 0/3] New inspect_list_applications2 API
Here's the new API method and update to virt-inspector. I still need to implement app_arch for debian and windows (if applicable), for now they just return empty strings. New in v2: incorporated feedback from v1, also added patch #3 which updates the documentation where it references the deprecated API. Take it or leave it.
2016 Sep 22
1
[PATCH v2] libvirt: read disk paths from pools (RHBZ#1366049)
A disk of type 'volume' is stored as <source pool='pool_name' volume='volume_name'/> and its real location is inside the 'volume_name', as 'pool_name': in this case, query libvirt for the actual path of the specified volume in the specified pool. Adjust the code so that: - for_each_disk gets the virConnectPtr, needed to do operations with libvirt
2012 Jul 21
8
[PATCH libguestfs 0/4] Add a libvirt backend to libguestfs.
This preliminary patch series adds a libvirt backend to libguestfs. It's for review only because although it launches the guest OK, there are some missing features that need to be implemented. The meat of the patch is in part 4/4. To save you the trouble of interpreting libxml2 fragments, an example of the generated XML and the corresponding qemu command line are attached below. Note the
2012 Oct 08
3
[PATCH v3 0/3] Add support for disk labels and hotplugging.
This is, I guess, version 3 of this patch series which adds disk labels and hotplugging (only hot-add implemented so far). The good news is .. it works! Rich.
2013 Feb 28
7
[PATCH 0/7] Fix SELinux security contexts so we can access shared disks (RHBZ#912499).
https://bugzilla.redhat.com/show_bug.cgi?id=912499 (especially comments 7 & 10) This patch set is the final fix so that we can access disks in use by other guests when SELinux and sVirt are enabled. Previously such disks were inaccessible because sVirt labels the disks with a random SELinux label to prevent other instances of qemu from being able to read them. So naturally the libguestfs
2007 Dec 03
3
pcre vs. regexp for Postfix checks
What are your opinions on pcre vs regexp for header_, body_, and mime_checks in Postfix? I looked at the regexp_table and prce_table man pages, and see almost no difference other than the available flags. Miark
2007 Nov 05
0
CESA-2007:0968 Critical CentOS 4 ia64 pcre - security update
CentOS Errata and Security Advisory 2007:0968 https://rhn.redhat.com/errata/RHSA-2007-0968.html The following updated files have been uploaded and are currently syncing to the mirrors: ia64: updates/ia64/RPMS/pcre-4.5-4.c4.1.ia64.rpm updates/ia64/RPMS/pcre-devel-4.5-4.c4.1.ia64.rpm -- Pasi Pirhonen - upi at iki.fi - http://pasi.pirhonen.eu/ Top-postings silently ignored -------------- next
2007 Nov 05
0
CESA-2007:0968 Critical CentOS 4 s390(x) pcre - security update
CentOS Errata and Security Advisory 2007:0968 https://rhn.redhat.com/errata/RHSA-2007-0968.html The following updated files have been uploaded and are currently syncing to the mirrors: s390: updates/s390/RPMS/pcre-4.5-4.c4.1.s390.rpm updates/s390/RPMS/pcre-devel-4.5-4.c4.1.s390.rpm s390x: updates/s390x/RPMS/pcre-4.5-4.c4.1.s390x.rpm updates/s390x/RPMS/pcre-devel-4.5-4.c4.1.s390x.rpm -- Pasi
2007 Nov 08
0
CESA-2007:0968 Critical CentOS 4 x86_64 pcre - security update
CentOS Errata and Security Advisory 2007:0968 https://rhn.redhat.com/errata/RHSA-2007-0968.html The following updated files have been uploaded and are currently syncing to the mirrors: x86_64: pcre-4.5-4.el4_5.1.i386.rpm pcre-4.5-4.el4_5.1.x86_64.rpm pcre-devel-4.5-4.el4_5.1.x86_64.rpm src: pcre-4.5-4.el4_5.1.src.rpm -------------- next part -------------- A non-text attachment was
2007 Nov 08
0
CESA-2007:0968 Critical CentOS 4 i386 pcre - security update
CentOS Errata and Security Advisory 2007:0968 https://rhn.redhat.com/errata/RHSA-2007-0968.html The following updated files have been uploaded and are currently syncing to the mirrors: i386: pcre-4.5-4.el4_5.1.i386.rpm pcre-devel-4.5-4.el4_5.1.i386.rpm src: pcre-4.5-4.el4_5.1.src.rpm -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type:
2007 Nov 08
0
CESA-2007:0967 Critical CentOS 5 i386 pcre Update
CentOS Errata and Security Advisory 2007:0967 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2007-0967.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) i386: f1713343d148ac1009aa394f33ce44d6 pcre-6.6-2.el5_0.1.i386.rpm c13c58fce6f093e1a1f501a76a0cd8c8 pcre-devel-6.6-2.el5_0.1.i386.rpm Source:
2007 Nov 08
0
CESA-2007:0967 Critical CentOS 5 x86_64 pcre Update
CentOS Errata and Security Advisory 2007:0967 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2007-0967.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) x86_64: f1713343d148ac1009aa394f33ce44d6 pcre-6.6-2.el5_0.1.i386.rpm e8a5d7756ddf0f4d795a8b45c8d3a39b pcre-6.6-2.el5_0.1.x86_64.rpm
2007 Nov 10
0
CESA-2007:1052 Critical CentOS 4 ia64 pcre - security update
CentOS Errata and Security Advisory 2007:1052 https://rhn.redhat.com/errata/RHSA-2007-1052.html The following updated files have been uploaded and are currently syncing to the mirrors: ia64: updates/ia64/RPMS/pcre-4.5-4.c4.4.ia64.rpm updates/ia64/RPMS/pcre-devel-4.5-4.c4.4.ia64.rpm -- Pasi Pirhonen - upi@iki.fi - http://pasi.pirhonen.eu/ Top-postings silently ignored -------------- next part
2007 Nov 10
0
CESA-2007:1052 Critical CentOS 4 s390(x) pcre - security update
CentOS Errata and Security Advisory 2007:1052 https://rhn.redhat.com/errata/RHSA-2007-1052.html The following updated files have been uploaded and are currently syncing to the mirrors: s390: updates/s390/RPMS/pcre-4.5-4.c4.4.s390.rpm updates/s390/RPMS/pcre-devel-4.5-4.c4.4.s390.rpm s390x: updates/s390x/RPMS/pcre-4.5-4.c4.4.s390x.rpm updates/s390x/RPMS/pcre-devel-4.5-4.c4.4.s390x.rpm -- Pasi
2007 Nov 12
0
CESA-2007:1052 Critical CentOS 4 x86_64 pcre - security update
CentOS Errata and Security Advisory 2007:1052 https://rhn.redhat.com/errata/RHSA-2007-1052.html The following updated files have been uploaded and are currently syncing to the mirrors: x86_64: pcre-4.5-4.el4_5.4.i386.rpm pcre-4.5-4.el4_5.4.x86_64.rpm pcre-devel-4.5-4.el4_5.4.x86_64.rpm src: pcre-4.5-4.el4_5.4.src.rpm -------------- next part -------------- A non-text attachment was