Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report. Summary: (selinux) spamassassin startup fails on boot https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171903 ------- Additional Comments From Nicolas.Mailhot@xxxxxxxxxxx 2005-10-28 09:51 EST ------- Unfortunately, rebooting with selinux-policy-targeted-1.27.2-7 shows the problem still exist (no manual relabel is needed nowadays right ?) audit2allow </var/log/audit/audit.log just after bootup shows theses spamd lines: allow spamd_t devpts_t:chr_file ioctl; allow spamd_t port_t:udp_socket name_bind; allow spamd_t user_home_t:dir { add_name getattr remove_name search write }; allow spamd_t user_home_t:file append create getattr ioctl link read rename setattr unlink write; It's a bit more complex than when doing spamassassin tests on an already running system -- Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.