Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Start time: 14:01:59 01/22/18
- Model Identifier: MacBookPro11,1
- System Version: macOS 10.13.2 (17C205)
- Kernel Version: Darwin 17.3.0
- Boot Mode: Safe
- System Integrity Protection: Enabled
- Time since boot: 4 minutes
- Battery
- Cycle Count: 1340
- Log
- Jan 22 13:48:12 com.apple.xpc.launchd.domain.system: Could not read path: path = //System/Library/LaunchAgents/com.apple.MDCrashReportd.plist, error = 2: No such file or directory
- Jan 22 13:54:18 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
- Jan 22 13:58:07 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/FamilyControls.framework/Versions/A/XPCServices/com.apple.FCiCloudPrefUpdater.xpc/Contents/MacOS/com.apple.FCiCloudPrefUpdater error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/MediaAccessibility.framework/Versions/A/XPCServices/com.apple.accessibility.mediaaccessibilityd.xpc/Contents/MacOS/com.apple.accessibility.mediaaccessibilityd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/ToneLibrary.framework/Versions/A/XPCServices/com.apple.tonelibraryd.xpc/Contents/MacOS/com.apple.tonelibraryd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/AOSKit.framework/Versions/A/XPCServices/com.apple.iCloudHelper.xpc/Contents/MacOS/com.apple.iCloudHelper error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/CloudServices.framework/Versions/A/XPCServices/com.apple.sbd.xpc/Contents/MacOS/com.apple.sbd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/GeoServices.framework/Versions/A/XPCServices/com.apple.geod.xpc/Contents/MacOS/com.apple.geod error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/AccountsDaemon.framework/XPCServices/DataclassOwnersManager.xpc/Contents/MacOS/DataclassOwnersManager error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/CloudPhotoServices.framework/Versions/A/Frameworks/CloudPhotosConfigurationXPC.framework/Versions/A/XPCServices/com.apple.CloudPhotosConfiguration.xpc/Contents/MacOS/com.apple.CloudPhotosConfiguration error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/ViewBridge.framework/Versions/A/XPCServices/ViewBridgeAuxiliary.xpc/Contents/MacOS/ViewBridgeAuxiliary error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc/Contents/MacOS/XPCTimeStampingService error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc/Contents/MacOS/com.apple.DictionaryServiceHelper error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc/Contents/MacOS/com.apple.hiservices-xpcservice error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc/Contents/MacOS/XPCKeychainSandboxCheck error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc/Contents/MacOS/IOServiceAuthorizeAgent error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc/Contents/MacOS/com.apple.SpeechRecognitionCore.brokerd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc, error = 1: Operation not permitted
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc, error = 1: Operation not permitted
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc, error = 1: Operation not permitted
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc, error = 1: Operation not permitted
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc, error = 1: Operation not permitted
- Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc, error = 1: Operation not permitted
- Jan 22 13:59:38 com.apple.Siri.1304: Service exited with abnormal code: 1
- CPU per process: WindowServer (UID 0) is using 173.5 %
- Daemons
- org.postfix.master
- Agents
- com.apple.SafariHistoryServiceAgent
- com.apple.SafariBookmarksSyncAgent
- com.apple.webinspectord
- com.apple.SafariNotificationAgent
- com.apple.SafariCloudHistoryPushAgent
- com.apple.SafariPlugInUpdateNotifier
- Contents of /etc/hosts (checksum 85078130)
- 127.0.0.1 localhost
- 255.255.255.255 broadcasthost
- ::1 localhost
- fe80::1%lo0 localhost
- Contents of /etc/pf.conf (checksum 2891177609)
- scrub-anchor "com.apple/*"
- nat-anchor "com.apple/*"
- rdr-anchor "com.apple/*"
- dummynet-anchor "com.apple/*"
- anchor "com.apple/*"
- load anchor "com.apple" from "/etc/pf.anchors/com.apple"
- Contents of /etc/syslog.conf (checksum 2399118465)
- install.* @127.0.0.1:32376
- Contents of /etc/pam.d/authorization (checksum 1288902703)
- auth optional pam_krb5.so use_first_pass use_kcminit
- auth optional pam_ntlm.so use_first_pass
- auth required pam_opendirectory.so use_first_pass nullok
- account required pam_opendirectory.so
- Contents of /etc/pam.d/authorization_aks (checksum 841932527)
- auth required pam_aks.so
- account required pam_opendirectory.so
- Contents of /etc/pam.d/authorization_ctk (checksum 2418984201)
- auth required pam_smartcard.so use_first_pass pkinit
- account required pam_opendirectory.so
- Contents of /etc/pam.d/authorization_la (checksum 2713564393)
- auth required pam_localauthentication.so
- auth required pam_aks.so
- account required pam_opendirectory.so
- Contents of /etc/pam.d/authorization_lacont (checksum 3048101696)
- auth required pam_localauthentication.so continuityunlock
- auth required pam_aks.so
- account required pam_opendirectory.so
- Contents of /etc/pam.d/checkpw (checksum 2672765862)
- auth required pam_opendirectory.so use_first_pass nullok
- account required pam_opendirectory.so no_check_home no_check_shell
- Contents of /etc/pam.d/chkpasswd (checksum 335781771)
- auth required pam_opendirectory.so
- account required pam_opendirectory.so
- password required pam_permit.so
- session required pam_permit.so
- Contents of /etc/pam.d/cups (checksum 2842188894)
- auth required pam_opendirectory.so
- account required pam_permit.so
- password required pam_deny.so
- session required pam_permit.so
- Contents of /etc/pam.d/login (checksum 1242678644)
- auth optional pam_krb5.so use_kcminit
- auth optional pam_ntlm.so try_first_pass
- auth optional pam_mount.so try_first_pass
- auth required pam_opendirectory.so try_first_pass
- account required pam_nologin.so
- account required pam_opendirectory.so
- password required pam_opendirectory.so
- session required pam_launchd.so
- session required pam_uwtmp.so
- session optional pam_mount.so
- Contents of /etc/pam.d/login.term (checksum 3930746290)
- account required pam_nologin.so
- account required pam_opendirectory.so
- session required pam_uwtmp.so
- Contents of /etc/pam.d/other (checksum 2748091512)
- auth required pam_deny.so
- account required pam_deny.so
- password required pam_deny.so
- session required pam_deny.so
- Contents of /etc/pam.d/passwd (checksum 1026516346)
- auth required pam_permit.so
- account required pam_opendirectory.so
- password required pam_opendirectory.so
- session required pam_permit.so
- Contents of /etc/pam.d/screensaver (checksum 3141704602)
- auth optional pam_krb5.so use_first_pass use_kcminit
- auth required pam_opendirectory.so use_first_pass nullok
- account required pam_opendirectory.so
- account sufficient pam_self.so
- account required pam_group.so no_warn group=admin,wheel fail_safe
- account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
- Contents of /etc/pam.d/screensaver_aks (checksum 3209544573)
- auth required pam_aks.so
- account required pam_opendirectory.so
- account sufficient pam_self.so
- account required pam_group.so no_warn group=admin,wheel fail_safe
- account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
- Contents of /etc/pam.d/screensaver_ctk (checksum 367670211)
- auth required pam_smartcard.so use_first_pass
- account required pam_opendirectory.so
- account sufficient pam_self.so
- account required pam_group.so no_warn group=admin,wheel fail_safe
- account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
- Contents of /etc/pam.d/screensaver_la (checksum 589164084)
- auth required pam_localauthentication.so
- auth required pam_aks.so
- account required pam_opendirectory.so
- account sufficient pam_self.so
- account required pam_group.so no_warn group=admin,wheel fail_safe
- account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
- Contents of /etc/pam.d/smbd (checksum 2516643123)
- account required pam_sacl.so sacl_service=smb allow_trustacct
- session required pam_permit.so
- Contents of /etc/pam.d/sshd (checksum 2989478361)
- auth optional pam_krb5.so use_kcminit
- auth optional pam_ntlm.so try_first_pass
- auth optional pam_mount.so try_first_pass
- auth required pam_opendirectory.so try_first_pass
- account required pam_nologin.so
- account required pam_sacl.so sacl_service=ssh
- account required pam_opendirectory.so
- password required pam_opendirectory.so
- session required pam_launchd.so
- session optional pam_mount.so
- Contents of /etc/pam.d/su (checksum 2045483434)
- auth sufficient pam_rootok.so
- auth required pam_opendirectory.so
- account required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe
- account required pam_opendirectory.so no_check_shell
- password required pam_opendirectory.so
- session required pam_launchd.so
- Contents of /etc/pam.d/sudo (checksum 1168067210)
- auth sufficient pam_smartcard.so
- auth required pam_opendirectory.so
- account required pam_permit.so
- password required pam_deny.so
- session required pam_permit.so
- Contents of /etc/periodic/daily/110.clean-tmps (checksum 4099837049)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_clean_tmps_enable" in
- [Yy][Ee][Ss])
- if [ -z "$daily_clean_tmps_days" ]
- then
- echo '$daily_clean_tmps_enable is set but' \
- '$daily_clean_tmps_days is not'
- rc=2
- else
- echo ""
- echo "Removing old temporary files:"
- set -f noglob
- args="-atime +$daily_clean_tmps_days -mtime +$daily_clean_tmps_days"
- args="${args} -ctime +$daily_clean_tmps_days"
- dargs="-empty -mtime +$daily_clean_tmps_days"
- dargs="${dargs} ! -name .vfs_rsrc_streams_*"
- [ -n "$daily_clean_tmps_ignore" ] && {
- args="$args "`echo " ${daily_clean_tmps_ignore% }" |
- sed 's/[ ][ ]*/ ! -name /g'`
- dargs="$dargs "`echo " ${daily_clean_tmps_ignore% }" |
- sed 's/[ ][ ]*/ ! -name /g'`
- ...and 21 more line(s)
- Contents of /etc/periodic/daily/130.clean-msgs (checksum 4292599426)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_clean_msgs_enable" in
- [Yy][Ee][Ss])
- if [ ! -d /var/msgs ]
- then
- echo '$daily_clean_msgs_enable is set but /var/msgs' \
- "doesn't exist"
- rc=2
- else
- echo ""
- echo "Cleaning out old system announcements:"
- [ -n "$daily_clean_msgs_days" ] &&
- arg=-${daily_clean_msgs_days#-} || arg=
- msgs -c $arg && rc=0 || rc=3
- fi;;
- *) rc=0;;
- esac
- exit $rc
- Contents of /etc/periodic/daily/140.clean-rwho (checksum 659374794)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_clean_rwho_enable" in
- [Yy][Ee][Ss])
- if [ -z "$daily_clean_rwho_days" ]
- then
- echo '$daily_clean_rwho_enable is enabled but' \
- '$daily_clean_rwho_days is not set'
- rc=2
- elif [ ! -d /var/rwho ]
- then
- echo '$daily_clean_rwho_enable is enabled but /var/rwho' \
- "doesn't exist"
- rc=2
- else
- echo ""
- echo "Removing stale files from /var/rwho:"
- case "$daily_clean_rwho_verbose" in
- [Yy][Ee][Ss])
- print=-print;;
- *)
- print=;;
- ...and 14 more line(s)
- Contents of /etc/periodic/daily/199.clean-fax (checksum 1104983357)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- if [ -d /var/spool/fax ]; then
- echo ""
- echo "Removing scratch fax files"
- cd /var/spool/fax && \
- find . -type f -name '[0-9]*.[0-9][0-9][0-9]' -mtime +7 -delete >/dev/null 2>&1;
- fi
- Contents of /etc/periodic/daily/310.accounting (checksum 3208203734)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_accounting_enable" in
- [Yy][Ee][Ss])
- if [ ! -f /var/account/acct ]
- then
- echo '$daily_accounting_enable is set but /var/account/acct' \
- "doesn't exist"
- rc=2
- elif [ -z "$daily_accounting_save" ]
- then
- echo '$daily_accounting_enable is set but ' \
- '$daily_accounting_save is not'
- rc=2
- else
- echo ""
- echo "Rotating accounting logs and gathering statistics:"
- cd /var/account
- rc=0
- n=$daily_accounting_save
- rm -f acct.$n.gz acct.$n || rc=3
- m=$n
- ...and 18 more line(s)
- Contents of /etc/periodic/daily/400.status-disks (checksum 1480768650)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_status_disks_enable" in
- [Yy][Ee][Ss])
- echo ""
- echo "Disk status:"
- df $daily_status_disks_df_flags && rc=1 || rc=3
- ;;
- *) rc=0;;
- esac
- exit $rc
- Contents of /etc/periodic/daily/420.status-network (checksum 2730873650)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_status_network_enable" in
- [Yy][Ee][Ss])
- echo ""
- echo "Network interface status:"
- case "$daily_status_network_usedns" in
- [Yy][Ee][Ss])
- netstat -i && rc=0 || rc=3;;
- *)
- netstat -in && rc=0 || rc=3;;
- esac;;
- *) rc=0;;
- esac
- exit $rc
- Contents of /etc/periodic/daily/430.status-rwho (checksum 3455351261)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$daily_status_rwho_enable" in
- [Yy][Ee][Ss])
- rwho=$(echo /var/rwho/*)
- if [ -f "${rwho%% *}" ]
- then
- echo ""
- echo "Local network system status:"
- prog=ruptime
- else
- echo ""
- echo "Local system status:"
- prog=uptime
- fi
- rc=$($prog | tee /dev/stderr | wc -l)
- if [ $? -eq 0 ]
- then
- [ $rc -gt 1 ] && rc=1
- else
- rc=3
- fi;;
- ...and 3 more line(s)
- Contents of /etc/periodic/daily/999.local (checksum 2319755381)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- rc=0
- for script in $daily_local
- do
- echo ''
- case "$script" in
- /*)
- if [ -f "$script" ]
- then
- echo "Running $script:"
- sh $script || rc=3
- else
- echo "$script: No such file"
- [ $rc -lt 2 ] && rc=2
- fi;;
- *)
- echo "$script: Not an absolute path"
- [ $rc -lt 2 ] && rc=2;;
- esac
- done
- exit $rc
- Contents of /etc/periodic/monthly/199.rotate-fax (checksum 3437454680)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- echo ""
- printf %s "Rotating fax log files:"
- cd /var/log/fax
- for i in *.log; do
- if [ -f "${i}" ]; then
- echo -n " $i"
- if [ -x /usr/bin/gzip ]; then gzext=".gz"; else gzext=""; fi
- if [ -f "${i}.3${gzext}" ]; then mv -f "${i}.3${gzext}" "${i}.4${gzext}"; fi
- if [ -f "${i}.2${gzext}" ]; then mv -f "${i}.2${gzext}" "${i}.3${gzext}"; fi
- if [ -f "${i}.1${gzext}" ]; then mv -f "${i}.1${gzext}" "${i}.2${gzext}"; fi
- if [ -f "${i}.0${gzext}" ]; then mv -f "${i}.0${gzext}" "${i}.1${gzext}"; fi
- if [ -f "${i}" ]; then mv -f "${i}" "${i}.0" && if [ -x /usr/bin/gzip ]; then gzip -9 "${i}.0"; fi; fi
- touch "${i}" && chmod 640 "${i}" && chown root:admin "${i}"
- fi
- done
- echo ""
- Contents of /etc/periodic/monthly/200.accounting (checksum 3541581936)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- oldmask=$(umask)
- umask 066
- case "$monthly_accounting_enable" in
- [Yy][Ee][Ss])
- W=/var/log/wtmp
- rc=0
- remove=NO
- if [ $rc -eq 0 ]
- then
- echo ""
- echo "Doing login accounting:"
- rc=$(ac -p | sort -nr -k 2 | tee /dev/stderr | wc -l)
- [ $rc -gt 0 ] && rc=1
- fi
- [ $remove = YES ] && rm -f $W.0;;
- *) rc=0;;
- esac
- umask $oldmask
- exit $rc
- Contents of /etc/periodic/monthly/999.local (checksum 2355967272)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- rc=0
- for script in $monthly_local
- do
- echo ''
- case "$script" in
- /*)
- if [ -f "$script" ]
- then
- echo "Running $script:"
- sh $script || rc=3
- else
- echo "$script: No such file"
- [ $rc -lt 2 ] && rc=2
- fi;;
- *)
- echo "$script: Not an absolute path"
- [ $rc -lt 2 ] && rc=2;;
- esac
- done
- exit $rc
- Contents of /etc/periodic/weekly/320.whatis (checksum 922328658)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- case "$weekly_whatis_enable" in
- [Yy][Ee][Ss])
- echo ""
- echo "Rebuilding whatis database:"
- MANPATH=`/usr/bin/manpath -q`
- if [ $? = 0 ]
- then
- if [ -z "${MANPATH}" ]
- then
- echo "manpath failed to find any manpage directories"
- rc=3
- else
- rc=0
- /usr/libexec/makewhatis.local "${MANPATH}" || rc=3
- if [ X"${man_locales}" != X ]
- then
- for i in ${man_locales}
- do
- LC_ALL=$i /usr/libexec/makewhatis.local -a \
- -L "${MANPATH}" || rc=3
- ...and 9 more line(s)
- Contents of /etc/periodic/weekly/999.local (checksum 3078968429)
- if [ -r /etc/defaults/periodic.conf ]
- then
- . /etc/defaults/periodic.conf
- source_periodic_confs
- fi
- rc=0
- for script in $weekly_local
- do
- echo ''
- case "$script" in
- /*)
- if [ -f "$script" ]
- then
- echo "Running $script:"
- sh $script || rc=3
- else
- echo "$script: No such file"
- [ $rc -lt 2 ] && rc=2
- fi;;
- *)
- echo "$script: Not an absolute path"
- [ $rc -lt 2 ] && rc=2;;
- esac
- done
- exit $rc
- Contents of /Library/Preferences/com.apple.security.appsandbox.plist (checksum 2599182411)
- <?xml version="1.0" encoding="UTF-8"?>
- <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1.0">
- <dict>
- <key>UnrestrictSpotlightContainerScope</key>
- <true/>
- </dict>
- </plist>
- Contents of /Library/Preferences/SystemConfiguration/com.apple.Boot.plist (checksum 1199119104)
- <?xml version="1.0" encoding="UTF-8"?>
- <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
- <plist version="1.0">
- <dict>
- <key>Kernel Flags</key>
- <string></string>
- </dict>
- </plist>
- Spotlight: Indexing and searching disabled
- Restricted files: 3
- Lockfiles: 2
- Elapsed time (s): 101
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement