Below are some avc denied messages produced from running "fixfiles
restore" in enforcing mode with updated policy-1.11.2-21.
Richard Hally
May 2 14:38:19 localhost kernel: audit(1083523099.396:0): avc: denied
{ getattr } for pid=31565 exe=/usr/sbin/setfiles
path=/var/named/chroot/var/named/chroot/dev/null dev=hdc3 ino=2453550
scontext=root:sysadm_r:setfiles_t
tcontext=system_u:object_r:named_conf_t tclass=chr_file
May 2 14:38:19 localhost kernel: audit(1083523099.397:0): avc: denied
{ getattr } for pid=31565 exe=/usr/sbin/setfiles
path=/var/named/chroot/var/named/chroot/dev/null dev=hdc3 ino=2453550
scontext=root:sysadm_r:setfiles_t
tcontext=system_u:object_r:named_conf_t tclass=chr_file
May 2 14:38:19 localhost kernel: audit(1083523099.397:0): avc: denied
{ getattr } for pid=31565 exe=/usr/sbin/setfiles
path=/var/named/chroot/var/named/chroot/dev/random dev=hdc3 ino=2453551
scontext=root:sysadm_r:setfiles_t
tcontext=system_u:object_r:named_conf_t tclass=chr_file
May 2 14:38:19 localhost kernel: audit(1083523099.398:0): avc: denied
{ getattr } for pid=31565 exe=/usr/sbin/setfiles
path=/var/named/chroot/var/named/chroot/dev/random dev=hdc3 ino=2453551
scontext=root:sysadm_r:setfiles_t
tcontext=system_u:object_r:named_conf_t tclass=chr_file