Hi Dan, Please find the below :-
[root@gfs1 ~]# su - vdsm -s /bin/bash -bash-4.1$ cd /usr/share/vdsm; python -c 'import hooks;print hooks._scriptsPerDir("before_device_create")' ['/usr/libexec/vdsm/hooks/before_device_create/50_noipspoof'] -bash-4.1$ Antoni @ selinux already in the permissive mode....do you want me to disable it ?? [root@gfs1 ~]# sestatus | grep -i mode Current mode: permissive Mode from config file: permissive [root@gfs1 ~]# On Fri, Jun 27, 2014 at 5:31 PM, Dan Kenigsberg <dan...@redhat.com> wrote: > On Fri, Jun 27, 2014 at 05:07:56PM +0800, Punit Dambiwal wrote: > > Hi Dan, > > > > Still the same....VM can spoof the ip address...attached is the VM domain > > xml file.... > > <snip> > > yep, the hook script did not come into action. > > > <interface type='bridge'> > > <mac address='00:1a:4a:81:80:01'/> > > <source bridge='private'/> > > <target dev='vnet0'/> > > <model type='virtio'/> > > <filterref filter='vdsm-no-mac-spoofing'/> > > <link state='up'/> > > <alias name='net0'/> > > <address type='pci' domain='0x0000' bus='0x00' slot='0x03' > function='0x0'/> > > </interface> > > and I am still at the dark regarding what could cause that. Would you > repeat the following line, as root and as vdsm user? > > $ cd /usr/share/vdsm; python -c 'import hooks;print > hooks._scriptsPerDir("before_device_create")' > >
_______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users