[systemd-devel] triggering a remove handker manually via cmd

2023-06-04 Thread daggs
Greetings, given a rule file which has a add and remove handlers, is there a way to manually trigger the remove handler of that file? Thanks, Dagg

Re: [systemd-devel] How to prevent users form seeing other user processes with loginctl/systemctl ?

2023-06-04 Thread antisimus
This is it. It works. Yes, I have "hidepid=2" configured proc mount, with your addition everything works as expected. Thank you very much Mantas. On Sun, 4 Jun 2023 at 16:00, Mantas Mikulėnas wrote: > Assuming you already have "hidepid" configured for /proc, you'll still > need to block

Re: [systemd-devel] How to prevent users form seeing other user processes with loginctl/systemctl ?

2023-06-04 Thread Mantas Mikulėnas
Assuming you already have "hidepid" configured for /proc, you'll still need to block access to the corresponding systemd D-Bus call: $ cat /etc/dbus-1/system.d/systemd-restrict.conf On

Re: [systemd-devel] How to prevent users form seeing other user processes with loginctl/systemctl ?

2023-06-04 Thread Tomasz Torcz
On Sun, Jun 04, 2023 at 11:50:20AM +0200, antisimus wrote: > Hello, > > Is there a way to hide process information (pids, command line) and prevent > one user accessing other user processes information. You can achieve that by mounting /proc with hidepid= option:

[systemd-devel] systemd-repart very slow creation of partitions with Encrypt=

2023-06-04 Thread Valentin David
I have been trying to create a root partition from initrd with systemd-repart. The repart.d file for this partition is as follow: [Partition] Type=root Label=root Encrypt=tpm2 Format=ext4 FactoryReset=yes I am just using systemd-repart.service in initrd, without modification (that is, it finds

[systemd-devel] How to prevent users form seeing other user processes with loginctl/systemctl ?

2023-06-04 Thread antisimus
Hello, Is there a way to hide process information (pids, command line) and prevent one user accessing other user processes information. On a shared system this can be a potential security risk and I really do not like idea users inspecting each other's running processes. Here I have user *bob