Product SiteDocumentation Site

20.2. Types

Type Enforcement is the main permission control used in SELinux targeted policy. All files and processes are labeled with a type: types define a domain for processes and a type for files. SELinux policy rules define how types access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it.
The following types are used with mysqld. Different types allow you to configure flexible access:
This type is used for the location of the MariaDB database. In Fedora, the default location for the database is the /var/lib/mysql/ directory, however this can be changed. If the location for the MariaDB database is changed, the new location must be labeled with this type. See the example in Section 20.4.1, “MariaDB Changing Database Location” for instructions on how to change the default database location and how to label the new section appropriately.
This type is used for the MariaDB main configuration file /etc/my.cnf and any other configuration files in the /etc/mysql/ directory.
This type is used for the mysqld binary located at /usr/libexec/mysqld, which is the default location for the MariaDB binary on Fedora. Other systems may locate this binary at /usr/sbin/mysqld which should also be labeled with this type.
This type is used for executable MariaDB-related files located in the /usr/lib/systemd/system/ directory by default in Fedora.
Logs for MariaDB need to be labeled with this type for proper operation. All log files in the /var/log/ directory matching the mysql.* wildcard must be labeled with this type.
This type is used by files in the /var/run/mariadb/ directory, specifically the process id (PID) named /var/run/mariadb/ which is created by the mysqld daemon when it runs. This type is also used for related socket files such as /var/lib/mysql/mysql.sock. Files such as these must be labeled correctly for proper operation as a confined service.