mariadb/support-files/policy/selinux
Daniel Black 76a27155b4 MDEV-33301 memlock with systemd still not working
.. even with MDEV-9095 fix

CapabilityBounding sets require filesystem setcap attributes
for the executable to gain privileges during execution.

A side effect of this however is the getauxvec(AT_SECURE) gets
set, and the secure_getenv from OpenSSL internals on
OPENSSL_CONF environment variable will get ignored (openssl gh issue
21770).

According to capabilities(7), Ambient capabilities don't trigger
ld.so triggering the secure execution mode.

Include SELinux and Apparmor capabilities for ipc_lock
2024-03-27 13:36:31 +11:00
..
mariadb-server.fc
mariadb-server.te MDEV-33301 memlock with systemd still not working 2024-03-27 13:36:31 +11:00
mariadb.te
README

Note: The included SELinux policy files can be used for MariaDB Galera cluster.
However, since these policies had been tested for a limited set of scenarios,
it is highly recommended that you run mysqld in "permissive" mode even with
these policies installed and report any denials on mariadb.org/jira.


How to generate and load the policy module of MariaDB Galera cluster ?
  * Generate the SELinux policy module.
    # cd <source>/policy/selinux/
    # make -f /usr/share/selinux/devel/Makefile mariadb-server.pp

  * Load the generated policy module.
    # semodule -i /path/to/mariadb-server.pp

  * Lastly, run the following command to allow tcp/4568 and udp/4567.
    # semanage port -a -t mysqld_port_t -p tcp 4568
    # semanage port -a -t mysqld_port_t -p udp 4567

How to run mysqld in permissve mode ?
  # semanage permissive -a mysqld_t