Hi Leon,
I don't have access to a CentOS 6.10 system handy, but it looks like a
policy issue. If I take you're ausearch output and pipe it to
audit2allow on my CentOS 7.6 system, I get the following:
#= httpd_t ==
# This avc is allowed in the current policy
allow htt
Hi, folks,
Got a user that's recently(? been having odd things with her
workstation video. This morning, in the logs, long before she got in, I
saw a ton of errors
Jan 18 08:06:50 kernel: VM fault (0x04, vmid 1) at page 10,
write from CP (48)
Jan 18 08:06:50 kernel: radeon :01:00.0: GPU f
Am 18.01.2019 um 16:17 schrieb Sean :
>
> I don't have access to a CentOS 6.10 system handy, but it looks like a
> policy issue. If I take you're ausearch output and pipe it to
> audit2allow on my CentOS 7.6 system, I get the following:
>
> #= httpd_t ==
>
> # This a
Does someone have a link to a how-to-do-it with firewalld, not "disable
firewalld and use iptables"?
mark
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos
> Am 18.01.2019 um 19:34 schrieb mark :
>
> Does someone have a link to a how-to-do-it with firewalld, not "disable
> firewalld and use iptables"?
https://firewalld.org/documentation/howto/
--
LF
___
CentOS mailing list
CentOS@centos.org
https://lis
On 1/18/19 10:34 AM, mark wrote:
Does someone have a link to a how-to-do-it with firewalld, not "disable
firewalld and use iptables"?
Are you trying to filter the packets crossing the bridge device?
If so, you should need three files:
1. /etc/dracut.conf.d/br_netfilter.conf:
add_drivers+="
6 matches
Mail list logo