On Fri, Jun 27, 2014 at 05:07:56PM +0800, Punit Dambiwal wrote:
Hi Dan,
Still the same....VM can spoof the ip address...attached is the VM domain
xml file....
<snip>
yep, the hook script did not come into action.
<interface type='bridge'>
<mac address='00:1a:4a:81:80:01'/>
<source bridge='private'/>
<target dev='vnet0'/>
<model type='virtio'/>
<filterref filter='vdsm-no-mac-spoofing'/>
<link state='up'/>
<alias name='net0'/>
<address type='pci' domain='0x0000' bus='0x00'
slot='0x03' function='0x0'/>
</interface>
and I am still at the dark regarding what could cause that. Would you
repeat the following line, as root and as vdsm user?
$ cd /usr/share/vdsm; python -c 'import hooks;print
hooks._scriptsPerDir("before_device_create")'