Well this is strange, and this should not be the reason but can you attach a ".py" ending to the file names (maybe vdsm performs some strange checks)? your permissions look good. the only other thing I can think of are selinux restrictions, can you check them with: #this gives you the actual used selinux security level: getenforce :this gives you the selinux attributes for the folder: ls -lZ /usr/libexec/vdsm/hooks/before_device_create
I first thought it might be related to vdsms sudoers rights but a plain python script should be executed without modification to the sudoers config. HTH Am 26.06.2014 06:22, schrieb Punit Dambiwal: > Hi Dan, > > The permission looks ok... > > > [root@gfs1 ~]# su - vdsm -s > /bin/bash > -bash-4.1$ ls -l /usr/libexec/vdsm/hooks/before_device_create > total 8 > -rwxr-xr-x. 1 root root 1702 Jun 10 05:25 50_macspoof > -rwxr-xr-x. 1 root root 2490 Jun 23 17:47 50_noipspoof > -bash-4.1$ exit > logout > [root@gfs1 ~]# > > But the strange thing is noipspoof hook not display in the host hooks > windows.... -- Mit freundlichen Grüßen / Regards Sven Kieske Systemadministrator Mittwald CM Service GmbH & Co. KG Königsberger Straße 6 32339 Espelkamp T: +49-5772-293-100 F: +49-5772-293-333 https://www.mittwald.de Geschäftsführer: Robert Meyer St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad Oeynhausen _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users