Ok, after reading "Red Hat SELinux BIND Security Profile" at
http://www.die.net/doc/linux/man/man8/named.8.html, I thought I would do as it recommended, which was to remove bind-chroot, and let SElinux make named more secure. Now I can't get named to run at all.
Before trying to run named (not bind-chroot) I put my zone files (644, owned by named) in /var/named and my conf file back to /etc/named.conf (644, owned by root). I also made sure /etc/sysconfig/named was set to "ROOTDIR=/var/named". I tried to "service named start" and got no response. Then I ran “rndc status” and got:
“rndc: connect failed: connection refused”
In messages it shows:
Nov 9 12:43:13 tarsus kernel: audit(1131651793.279:10): avc: denied { read } for pid=4622 comm="rndc" name="hosts" dev=dm-0 ino=99029 scontext=root:system_r:ndc_t tcontext=system_u

bject_r:file_t tclass=file
Nov 9 12:43:13 tarsus kernel: audit(1131651793.280:11): avc: denied { getattr } for pid=4622 comm="rndc" name="hosts" dev=dm-0 ino=99029 scontext=root:system_r:ndc_t tcontext=system_u

bject_r:file_t tclass=file
So SElinux is blocking access. The man page made it appear that it was mainly to block Ddns and zone transfers to /var/named.
Any idea why it’s blocking rndc access to hosts?
At least when I was using bind-chroot I could get named to run and load zone files and get host/ping to work.