SELinux makes a suggestion. I am wary to simply following these, as I assume a policy should be in place:
SELinux is preventing rc from add_name access on the directory tmp. For complete SELinux messages run: sealert -l 3f6b978a-bbb1-48c8-95a6-6e1673e6b5f9
SELinux is preventing rc from add_name access on the directory tmp.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that rc should be allowed add_name access on the tmp directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'rc' --raw | audit2allow -M my-rc
# semodule -X 300 -i my-rc.pp
However, I know very little about SELinux yet, and I cannot interpret this page. I do not know if the policy is correct (and should handle the issue at hand) or if it is installed on my Leap 16 beta.
What should I do? Is this a bug? How can I work around the issue? Should I run the SELinux suggestion? Am I just overlooking a package? Should I install selinux-policy-devel, despite it being a development package? (I have selinux-policy, cockpit-selinux and cockpit-selinux-policies installed.)
The bug is mentioned in Request 1275299: Submit selinux-policy - openSUSE Build Service some days ago and should be solved, but my system is up to date and the issue still occurs as described on bugzilla. (I have not tried the suggested workaround yet.)