--->Back to the future...---> I've had this problem in the early days of FC13 (from what I remember this was my first post ever in this mailing list), today upgraded to FC14 and ... voila... here we go again: type=AVC msg=audit(1294001576.891:33): avc: denied { read } for pid=2753 comm="ipset" path="/etc/shorewall/ips/blacklist-eu1.ips" dev=dm-0 ino=16488 scontext=unconfined _u:system_r:iptables_t:s0 tcontext=system_u:object_r:shorewall_etc_t:s0 tclass=file type=SYSCALL msg=audit(1294001576.891:33): arch=40000003 syscall=11 success=yes exit=0 a0=979f3c0 a1=979f520 a2=9794ba0 a3=979f520 items=0 ppid=2727 pid=2753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="ipset" exe="/sbin/ipset" subj=unconfined_u:system_r:iptables_t:s0 key=(null) Quick scan with sesearch on the policy with FC13 (which works!) reveals this: [zeek@test1 serefpolicy-3.7.19]$ sesearch -A -s iptables_t -t shorewall_etc_t Found 3 semantic av rules: allow iptables_t configfile : file { ioctl read getattr lock open } ; allow iptables_t configfile : dir { ioctl read getattr lock search open } ; allow iptables_t configfile : lnk_file { read getattr } ; While the same command when executed with the newest version of the targeted policy on FC14 fetches nothing! So, my questions is - what has changed and why?! -- selinux mailing list selinux@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/selinux