> It's not hard to test whether or not SELinux is the problem. You can
> turn SELinux off on the command-line with this command:
>
> setenforce 0
>
> Of course, you need to be root in order to do this.
>
> After turning SELinux off, you can try reproducing the error. If it
> still occurs, it's SELinux, if it doesn't the problem is elswhere. When
> your done, you can reenable SELinux with
>
> setenforce 1
>
> If you're running your job across multiple nodes, you should disable
> SELinux on all of them for testing.

You are not actually disabling SELinux with setenforce 0, just
putting it into "permissive" mode: SELinux is still active.

Running SELinux in its permissive mode, as opposed to disabling it
at boot time, sees SELinux making a log of things that would cause
it to dive in, were it running in "enforcing" mode.

There's then a tool you can run over that log that will suggest
the ACL changes you need to make to fix the issue from an SELinux
perspective.

-- 
Kevin M. Buckley                                  Room:  CO327
School of Engineering and                         Phone: +64 4 463 5971
 Computer Science
Victoria University of Wellington
New Zealand

Reply via email to