I tried:
/sbin/chkconfig --level 2345 mysqld on
then tried:
/usr/bin/mysqld_safe --user=mysql --socket=/var/lib/mysql/mysql.sock --pid-file=/var/run/mysqld.pid --datadir=/var/lib/mysql --skip-grant-tables --skip-networking &
And got still:
nohup: ignoring input and redirecting stderr to stdout
Starting mysqld daemon with databases from /var/lib/mysql
STOPPING server from pid file /var/run/mysqld.pid
090222 21:37:42 mysqld ended
While this was occurring I got a SELinux message, see below:
Summary:
SELinux is preventing rm (mysqld_safe_t) "write" to ./mysql (mysqld_db_t).
Detailed Description:
SELinux denied access requested by rm. It is not expected that this access is
required by rm and this access may signal an intrusion attempt. It is also
possible that the specific version or configuration of the application is
causing it to require additional access.
Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./mysql,
restorecon -v './mysql'
If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(
http://fedora.redhat.com/docs/selinu...fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context unconfined_u:system_r:mysqld_safe_t:s0
Target Context system_u
bject_r:mysqld_db_t:s0
Target Objects ./mysql [ dir ]
Source rm
Source Path /bin/rm
Port <Unknown>
Host Diamond
Source RPM Packages coreutils-6.12-18.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-45.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name Diamond
Platform Linux Diamond 2.6.27.15-170.2.24.fc10.i686 #1 SMP
Wed Feb 11 23:58:12 EST 2009 i686 i686
Alert Count 1
First Seen Sun 22 Feb 2009 09:30:49 PM EST
Last Seen Sun 22 Feb 2009 09:39:43 PM EST
Local ID 7e14785c-de8c-4953-8606-18aed35a5d4d
Line Numbers
Raw Audit Messages
node=Diamond type=AVC msg=audit(1235299183.344:32): avc: denied { write } for pid=5029 comm="rm" name="mysql" dev=dm-0 ino=1220611 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=system_u
bject_r:mysqld_db_t:s0 tclass=dir
node=Diamond type=AVC msg=audit(1235299183.344:32): avc: denied { remove_name } for pid=5029 comm="rm" name="mysql.sock" dev=dm-0 ino=1220676 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=system_u
bject_r:mysqld_db_t:s0 tclass=dir
node=Diamond type=AVC msg=audit(1235299183.344:32): avc: denied { unlink } for pid=5029 comm="rm" name="mysql.sock" dev=dm-0 ino=1220676 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=unconfined_u
bject_r:mysqld_db_t:s0 tclass=sock_file
node=Diamond type=SYSCALL msg=audit(1235299183.344:32): arch=40000003 syscall=301 success=yes exit=0 a0=ffffff9c a1=bfbb39a5 a2=0 a3=bfbb39a5 items=0 ppid=4980 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="rm" exe="/bin/rm" subj=unconfined_u:system_r:mysqld_safe_t:s0 key=(null)