Red HatThis forum is for the discussion of Red Hat Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Can it be something related to selinux? Is it enabled? What's its state?
Yeah, I was pretty sure I disabled it - which when I checked it was;
[signal@signal-router ~]$ cat /etc/sysconfig/selinux
# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - SELinux is fully disabled.
SELINUX=disabled
# SELINUXTYPE= type of policy in use. Possible values are:
# targeted - Only targeted network daemons are protected.
# strict - Full SELinux protection.
SELINUXTYPE=targeted
# SETLOCALDEFS= Check local definition changes
SETLOCALDEFS=0
[signal@signal-router ~]$ uname -a
Linux signal-router 2.6.18-194.17.1.el5.centos.plusxen #1 SMP Thu Sep 30 20:56:28 EDT 2010 i686 athlon i386 GNU/Linux
Last edited by zer0signal; 10-19-2010 at 12:11 PM.
[root@signal-desktop signal]# service iptables stop
iptables: Flushing firewall rules: [ OK ]
iptables: Setting chains to policy ACCEPT: filter [ OK ]
iptables: Unloading modules: [ OK ]
[root@signal-desktop signal]# mount 192.168.5.1:/mnt/data /mnt/vmdata/
mount.nfs: access denied by server while mounting 192.168.5.1:/mnt/data
[root@signal-desktop signal]# cat /etc/sysconfig/nfs
#
# Define which protocol versions mountd
# will advertise. The values are "no" or "yes"
# with yes being the default #MOUNTD_NFS_V1="no" #MOUNTD_NFS_V2="no" #MOUNTD_NFS_V3="no"
#
#
# Path to remote quota server. See rquotad(8) #RQUOTAD="/usr/sbin/rpc.rquotad"
# Port rquotad should listen on.#RQUOTAD_PORT=875# Optinal options passed to rquotad
#RPCRQUOTADOPTS=""
### Optional arguments passed to in-kernel lockd
#LOCKDARG=
#TCP port rpc.lockd should listen on.
#LOCKD_TCPPORT=32803# UDP port rpc.lockd should listen on.
#LOCKD_UDPPORT=32769
### Optional arguments passed to rpc.nfsd. See rpc.nfsd(8)# Turn off v2 and v3 protocol support
#RPCNFSDARGS="-N 2 -N 3"
# Turn off v4 protocol support#RPCNFSDARGS="-N 4"
# Number of nfs server processes to be started.
# The default is 8.
#RPCNFSDCOUNT=8
# Stop the nfsd module from being pre-loaded
#NFSD_MODULE="noload"
### Optional arguments passed to rpc.mountd. See rpc.mountd(8)
#RPCMOUNTDOPTS=""
# Port rpc.mountd should listen on.
#MOUNTD_PORT=892
### Optional arguments passed to rpc.statd. See rpc.statd(8)
#STATDARG=""
# Port rpc.statd should listen on.
#STATD_PORT=662
# Outgoing port statd should used. The default is port
# is random
#STATD_OUTGOING_PORT=2020
# Specify callout program
#STATD_HA_CALLOUT="/usr/local/bin/foo"
### Optional arguments passed to rpc.idmapd. See rpc.idmapd(8)
#RPCIDMAPDARGS=""
## Set to turn on Secure NFS mounts.
#SECURE_NFS="yes"
# Optional arguments passed to rpc.gssd. See rpc.gssd(8)
#RPCGSSDARGS=""
# Optional arguments passed to rpc.svcgssd. See rpc.svcgssd(8)
#RPCSVCGSSDARGS=""
#
Last edited by zer0signal; 10-19-2010 at 01:30 PM.
I mean could it be NIS? I cant imagine cause I had the same setup on my fedora box, with no issues.. I'm really at a loss on this, been kicking it around for a few weeks... Just really dont know my next direction... Thanks again for all the help though! =)
The NTFS module is not enabled in the centoplus (Repositories/CentOSPlus) kernel starting with CentOS-5.3. This is because NTFS in 5.3 is broken. Please see https://bugzilla.redhat.com/show_bug.cgi?id=481495 for details. If you would like to use the NTFS driver from the CentOS kernel, you can do so by installing kmod-ntfs from the ELRepo project. However, unlike ntfs-3g, the write option of the kernel ntfs module iUntils extremely limited
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.