<div dir="ltr">Hi Dan,<div><br></div><div>Please find the below :- </div><div><br></div><div><div>[root@gfs1 ~]# su - vdsm -s /bin/bash</div><div>-bash-4.1$ cd /usr/share/vdsm; python -c 'import hooks;print hooks._scriptsPerDir("before_device_create")'</div>
<div>['/usr/libexec/vdsm/hooks/before_device_create/50_noipspoof']</div><div>-bash-4.1$</div></div><div><br></div><div>Antoni @ selinux already in the permissive mode....do you want me to disable it ??</div><div><br>
</div><div><div>[root@gfs1 ~]# sestatus | grep -i mode</div><div>Current mode: permissive</div><div>Mode from config file: permissive</div><div>[root@gfs1 ~]#</div></div></div><div class="gmail_extra">
<br><br><div class="gmail_quote">On Fri, Jun 27, 2014 at 5:31 PM, Dan Kenigsberg <span dir="ltr"><<a href="mailto:danken@redhat.com" target="_blank">danken@redhat.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="">On Fri, Jun 27, 2014 at 05:07:56PM +0800, Punit Dambiwal wrote:<br>
> Hi Dan,<br>
><br>
> Still the same....VM can spoof the ip address...attached is the VM domain<br>
> xml file....<br>
<br>
</div><snip><br>
<br>
yep, the hook script did not come into action.<br>
<br>
> <interface type='bridge'><br>
> <mac address='00:1a:4a:81:80:01'/><br>
<div class="">> <source bridge='private'/><br>
> <target dev='vnet0'/><br>
> <model type='virtio'/><br>
> <filterref filter='vdsm-no-mac-spoofing'/><br>
> <link state='up'/><br>
> <alias name='net0'/><br>
</div>> <address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/><br>
> </interface><br>
<br>
and I am still at the dark regarding what could cause that. Would you<br>
repeat the following line, as root and as vdsm user?<br>
<br>
$ cd /usr/share/vdsm; python -c 'import hooks;print hooks._scriptsPerDir("before_device_create")'<br>
<br>
</blockquote></div><br></div>