OXIESEC PANEL
- Current Dir:
/
/
snap
/
core24
/
888
/
usr
/
lib
/
systemd
/
system
/
sysinit.target.wants
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/18/2025 08:12:16 AM
rwxr-xr-x
📄
apparmor.service
0 bytes
01/01/1970 12:00:00 AM
---------
📄
cryptsetup.target
420 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
dev-hugepages.mount
775 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
dev-mqueue.mount
701 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
finalrd.service
0 bytes
01/01/1970 12:00:00 AM
---------
📄
integritysetup.target
430 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
kmod-static-nodes.service
711 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
ldconfig.service
756 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
plymouth-start.service
617 bytes
02/25/2025 05:47:08 AM
rw-r--r--
📄
proc-sys-fs-binfmt_misc.automount
789 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
sys-fs-fuse-connections.mount
1.12 KB
02/27/2024 05:26:04 PM
rw-r--r--
📄
sys-kernel-config.mount
1.08 KB
02/27/2024 05:26:04 PM
rw-r--r--
📄
sys-kernel-debug.mount
730 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
sys-kernel-tracing.mount
756 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-ask-password-console.path
771 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-binfmt.service
1.18 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-firstboot.service
1.5 KB
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-hwdb-update.service
834 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-journal-catalog-update.service
750 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-journal-flush.service
827 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-journald.service
2.39 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-machine-id-commit.service
748 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-modules-load.service
1019 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-pstore.service
0 bytes
01/01/1970 12:00:00 AM
---------
📄
systemd-random-seed.service
1.16 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-repart.service
1.26 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-resolved.service
0 bytes
01/01/1970 12:00:00 AM
---------
📄
systemd-sysctl.service
731 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-sysusers.service
1.28 KB
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-timesyncd.service
0 bytes
01/01/1970 12:00:00 AM
---------
📄
systemd-tmpfiles-setup-dev-early.service
852 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-tmpfiles-setup-dev.service
877 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-tmpfiles-setup.service
1005 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-udev-trigger.service
758 bytes
02/27/2024 05:26:04 PM
rw-r--r--
📄
systemd-udevd.service
1.29 KB
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-update-done.service
682 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
systemd-update-utmp.service
856 bytes
02/21/2025 09:18:31 PM
rw-r--r--
📄
veritysetup.target
427 bytes
02/27/2024 05:26:04 PM
rw-r--r--
Editing: systemd-journald.service
Close
# SPDX-License-Identifier: LGPL-2.1-or-later # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [Unit] Description=Journal Service Documentation=man:systemd-journald.service(8) man:journald.conf(5) DefaultDependencies=no Requires=systemd-journald.socket After=systemd-journald.socket systemd-journald-dev-log.socket systemd-journald-audit.socket syslog.socket Before=sysinit.target # To avoid journald SIGKILLed during soft-reboot and corrupting journals. # See https://github.com/systemd/systemd/issues/30195 Before=soft-reboot.target Conflicts=soft-reboot.target # Mount and swap units need the journal socket units. If they were removed by # an isolate request the mount and swap units would be removed too, hence let's # exclude systemd-journald and its sockets from isolate requests. IgnoreOnIsolate=yes [Service] DeviceAllow=char-* rw ExecStart=/usr/lib/systemd/systemd-journald FileDescriptorStoreMax=4224 IPAddressDeny=any LockPersonality=yes MemoryDenyWriteExecute=yes NoNewPrivileges=yes OOMScoreAdjust=-250 ProtectClock=yes Restart=always RestartSec=0 RestrictAddressFamilies=AF_UNIX AF_NETLINK RestrictNamespaces=yes RestrictRealtime=yes RestrictSUIDSGID=yes RuntimeDirectory=systemd/journal RuntimeDirectoryPreserve=yes # Audit socket is not listed here because this unit can be turned off. However # the link between the socket and the service units is still created thanks to # the 'Service=' setting specified in the socket unit. Sockets=systemd-journald.socket systemd-journald-dev-log.socket StandardOutput=null SystemCallArchitectures=native SystemCallErrorNumber=EPERM SystemCallFilter=@system-service Type=notify PassEnvironment=TERM WatchdogSec=3min # In case you're wondering why CAP_SYS_PTRACE is needed, access to # /proc/<pid>/exe requires this capability. Thus if this capability is missing # the _EXE=/OBJECT_EXE= fields will be missing from the journal entries. CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE CAP_SYSLOG CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_CHOWN CAP_DAC_READ_SEARCH CAP_FOWNER CAP_SETUID CAP_SETGID CAP_MAC_OVERRIDE # If there are many split up journal files we need a lot of fds to access them # all in parallel. LimitNOFILE=524288