Well what do you know! Allowing bin_t dir search and lnk read, today I get the following AVC (cleaned up a bit). It looks like the clamav milter is trying to run a script. I am making the assumption that this script execution is valid. Summary SELinux is preventing /usr/sbin/clamav-milter (clamd_t) "execute" to <Unknown> (shell_exec_t). Additional Information Source Context system_u:system_r:clamd_t:s0 Target Context system_u:object_r:shell_exec_t:s0 Target Objects None [ file ] Affected RPM Packages clamav-milter-0.92.1-1.fc8 [application] Policy RPM selinux-policy-3.0.8-84.fc8 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name plugins.catchall_file Host Name kilroy.chi.il.us Platform Linux kilroy.chi.il.us 2.6.23.15-137.fc8 #1 SMP Sun Feb 10 17:48:34 EST 2008 i686 i686 Alert Count 1 First Seen Sat 01 Mar 2008 03:13:03 PM CST Last Seen Sat 01 Mar 2008 03:13:03 PM CST Local ID e5f2cc68-acf3-4cc6-8c75-c73e0863d49a Line Numbers Raw Audit Messages avc: denied { execute } for comm=clamav-milter dev=dm-0 egid=486 euid=492 exe=/usr/sbin/clamav-milter exit=-13 fsgid=486 fsuid=492 gid=486 items=0 name=bash pid=22644 scontext=system_u:system_r:clamd_t:s0 sgid=486 subj=system_u:system_r:clamd_t:s0 suid=492 tclass=file tcontext=system_u:object_r:shell_exec_t:s0 tty=(none) uid=492 The now current policy with all changes mentioned before is: module myclamav 1.0; require { type shell_exec_t; type bin_t; type clamd_t; class lnk_file read; class file execute; class dir search; } #============= clamd_t ============== allow clamd_t bin_t:dir search; allow clamd_t bin_t:lnk_file read; allow clamd_t shell_exec_t:file execute; If I get anything new I will send another EMail. I'll also upgrade to the latest Fedora 8 selinux policy and setroubleshoot soon. :) Eddie -- Edward Kuns <ekuns@xxxxxxxxxxxxxxxx> -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list