Index: tpm2-abrmd-3.0.0/dist/tpm2-abrmd.service.in =================================================================== --- tpm2-abrmd-3.0.0.orig/dist/tpm2-abrmd.service.in +++ tpm2-abrmd-3.0.0/dist/tpm2-abrmd.service.in @@ -6,6 +6,17 @@ After=dev-tpm0.device Requires=dev-tpm0.device [Service] +# added automatically, for details please see +# https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort +ProtectSystem=full +ProtectHome=read-only +ProtectHostname=true +ProtectKernelTunables=true +ProtectKernelModules=true +ProtectKernelLogs=true +ProtectControlGroups=true +RestrictRealtime=true +# end of automatic additions Type=dbus BusName=com.intel.tss2.Tabrmd ExecStart=@SBINDIR@/tpm2-abrmd Index: tpm2-abrmd-3.0.0/selinux/tabrmd.te =================================================================== --- tpm2-abrmd-3.0.0.orig/selinux/tabrmd.te +++ tpm2-abrmd-3.0.0/selinux/tabrmd.te @@ -9,7 +9,7 @@ gen_tunable(`tabrmd_connect_all_unreserv type tabrmd_t; type tabrmd_exec_t; -init_daemon_domain(tabrmd_t, tabrmd_exec_t) +init_nnp_daemon_domain(tabrmd_t, tabrmd_exec_t) allow tabrmd_t self:unix_dgram_socket { create_socket_perms };