Advertisement
Guest User

Untitled

a guest
Jan 22nd, 2018
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 25.69 KB | None | 0 0
  1. Start time: 14:01:59 01/22/18
  2.  
  3. Model Identifier: MacBookPro11,1
  4. System Version: macOS 10.13.2 (17C205)
  5. Kernel Version: Darwin 17.3.0
  6. Boot Mode: Safe
  7. System Integrity Protection: Enabled
  8. Time since boot: 4 minutes
  9.  
  10. Battery
  11.  
  12. Cycle Count: 1340
  13.  
  14. Log
  15.  
  16. Jan 22 13:48:12 com.apple.xpc.launchd.domain.system: Could not read path: path = //System/Library/LaunchAgents/com.apple.MDCrashReportd.plist, error = 2: No such file or directory
  17. Jan 22 13:54:18 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
  18. Jan 22 13:58:07 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
  19. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/FamilyControls.framework/Versions/A/XPCServices/com.apple.FCiCloudPrefUpdater.xpc/Contents/MacOS/com.apple.FCiCloudPrefUpdater error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  20. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/MediaAccessibility.framework/Versions/A/XPCServices/com.apple.accessibility.mediaaccessibilityd.xpc/Contents/MacOS/com.apple.accessibility.mediaaccessibilityd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  21. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/ToneLibrary.framework/Versions/A/XPCServices/com.apple.tonelibraryd.xpc/Contents/MacOS/com.apple.tonelibraryd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  22. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/AOSKit.framework/Versions/A/XPCServices/com.apple.iCloudHelper.xpc/Contents/MacOS/com.apple.iCloudHelper error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  23. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/CloudServices.framework/Versions/A/XPCServices/com.apple.sbd.xpc/Contents/MacOS/com.apple.sbd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  24. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/GeoServices.framework/Versions/A/XPCServices/com.apple.geod.xpc/Contents/MacOS/com.apple.geod error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  25. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/AccountsDaemon.framework/XPCServices/DataclassOwnersManager.xpc/Contents/MacOS/DataclassOwnersManager error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  26. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/CloudPhotoServices.framework/Versions/A/Frameworks/CloudPhotosConfigurationXPC.framework/Versions/A/XPCServices/com.apple.CloudPhotosConfiguration.xpc/Contents/MacOS/com.apple.CloudPhotosConfiguration error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  27. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/ViewBridge.framework/Versions/A/XPCServices/ViewBridgeAuxiliary.xpc/Contents/MacOS/ViewBridgeAuxiliary error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  28. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc/Contents/MacOS/XPCTimeStampingService error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  29. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc/Contents/MacOS/com.apple.DictionaryServiceHelper error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  30. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc/Contents/MacOS/com.apple.hiservices-xpcservice error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  31. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc/Contents/MacOS/XPCKeychainSandboxCheck error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  32. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc/Contents/MacOS/IOServiceAuthorizeAgent error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  33. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc/Contents/MacOS/com.apple.SpeechRecognitionCore.brokerd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
  34. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc, error = 1: Operation not permitted
  35. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc, error = 1: Operation not permitted
  36. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc, error = 1: Operation not permitted
  37. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc, error = 1: Operation not permitted
  38. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc, error = 1: Operation not permitted
  39. Jan 22 13:58:15 com.apple.xpc.launchd.domain.pid.SecurityAgent.261: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc, error = 1: Operation not permitted
  40. Jan 22 13:59:38 com.apple.Siri.1304: Service exited with abnormal code: 1
  41.  
  42. CPU per process: WindowServer (UID 0) is using 173.5 %
  43.  
  44. Daemons
  45.  
  46. org.postfix.master
  47.  
  48. Agents
  49.  
  50. com.apple.SafariHistoryServiceAgent
  51. com.apple.SafariBookmarksSyncAgent
  52. com.apple.webinspectord
  53. com.apple.SafariNotificationAgent
  54. com.apple.SafariCloudHistoryPushAgent
  55. com.apple.SafariPlugInUpdateNotifier
  56.  
  57. Contents of /etc/hosts (checksum 85078130)
  58.  
  59. 127.0.0.1 localhost
  60. 255.255.255.255 broadcasthost
  61. ::1 localhost
  62. fe80::1%lo0 localhost
  63.  
  64. Contents of /etc/pf.conf (checksum 2891177609)
  65.  
  66. scrub-anchor "com.apple/*"
  67. nat-anchor "com.apple/*"
  68. rdr-anchor "com.apple/*"
  69. dummynet-anchor "com.apple/*"
  70. anchor "com.apple/*"
  71. load anchor "com.apple" from "/etc/pf.anchors/com.apple"
  72.  
  73. Contents of /etc/syslog.conf (checksum 2399118465)
  74.  
  75. install.* @127.0.0.1:32376
  76.  
  77. Contents of /etc/pam.d/authorization (checksum 1288902703)
  78.  
  79. auth optional pam_krb5.so use_first_pass use_kcminit
  80. auth optional pam_ntlm.so use_first_pass
  81. auth required pam_opendirectory.so use_first_pass nullok
  82. account required pam_opendirectory.so
  83.  
  84. Contents of /etc/pam.d/authorization_aks (checksum 841932527)
  85.  
  86. auth required pam_aks.so
  87. account required pam_opendirectory.so
  88.  
  89. Contents of /etc/pam.d/authorization_ctk (checksum 2418984201)
  90.  
  91. auth required pam_smartcard.so use_first_pass pkinit
  92. account required pam_opendirectory.so
  93.  
  94. Contents of /etc/pam.d/authorization_la (checksum 2713564393)
  95.  
  96. auth required pam_localauthentication.so
  97. auth required pam_aks.so
  98. account required pam_opendirectory.so
  99.  
  100. Contents of /etc/pam.d/authorization_lacont (checksum 3048101696)
  101.  
  102. auth required pam_localauthentication.so continuityunlock
  103. auth required pam_aks.so
  104. account required pam_opendirectory.so
  105.  
  106. Contents of /etc/pam.d/checkpw (checksum 2672765862)
  107.  
  108. auth required pam_opendirectory.so use_first_pass nullok
  109. account required pam_opendirectory.so no_check_home no_check_shell
  110.  
  111. Contents of /etc/pam.d/chkpasswd (checksum 335781771)
  112.  
  113. auth required pam_opendirectory.so
  114. account required pam_opendirectory.so
  115. password required pam_permit.so
  116. session required pam_permit.so
  117.  
  118. Contents of /etc/pam.d/cups (checksum 2842188894)
  119.  
  120. auth required pam_opendirectory.so
  121. account required pam_permit.so
  122. password required pam_deny.so
  123. session required pam_permit.so
  124.  
  125. Contents of /etc/pam.d/login (checksum 1242678644)
  126.  
  127. auth optional pam_krb5.so use_kcminit
  128. auth optional pam_ntlm.so try_first_pass
  129. auth optional pam_mount.so try_first_pass
  130. auth required pam_opendirectory.so try_first_pass
  131. account required pam_nologin.so
  132. account required pam_opendirectory.so
  133. password required pam_opendirectory.so
  134. session required pam_launchd.so
  135. session required pam_uwtmp.so
  136. session optional pam_mount.so
  137.  
  138. Contents of /etc/pam.d/login.term (checksum 3930746290)
  139.  
  140. account required pam_nologin.so
  141. account required pam_opendirectory.so
  142. session required pam_uwtmp.so
  143.  
  144. Contents of /etc/pam.d/other (checksum 2748091512)
  145.  
  146. auth required pam_deny.so
  147. account required pam_deny.so
  148. password required pam_deny.so
  149. session required pam_deny.so
  150.  
  151. Contents of /etc/pam.d/passwd (checksum 1026516346)
  152.  
  153. auth required pam_permit.so
  154. account required pam_opendirectory.so
  155. password required pam_opendirectory.so
  156. session required pam_permit.so
  157.  
  158. Contents of /etc/pam.d/screensaver (checksum 3141704602)
  159.  
  160. auth optional pam_krb5.so use_first_pass use_kcminit
  161. auth required pam_opendirectory.so use_first_pass nullok
  162. account required pam_opendirectory.so
  163. account sufficient pam_self.so
  164. account required pam_group.so no_warn group=admin,wheel fail_safe
  165. account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
  166.  
  167. Contents of /etc/pam.d/screensaver_aks (checksum 3209544573)
  168.  
  169. auth required pam_aks.so
  170. account required pam_opendirectory.so
  171. account sufficient pam_self.so
  172. account required pam_group.so no_warn group=admin,wheel fail_safe
  173. account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
  174.  
  175. Contents of /etc/pam.d/screensaver_ctk (checksum 367670211)
  176.  
  177. auth required pam_smartcard.so use_first_pass
  178. account required pam_opendirectory.so
  179. account sufficient pam_self.so
  180. account required pam_group.so no_warn group=admin,wheel fail_safe
  181. account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
  182.  
  183. Contents of /etc/pam.d/screensaver_la (checksum 589164084)
  184.  
  185. auth required pam_localauthentication.so
  186. auth required pam_aks.so
  187. account required pam_opendirectory.so
  188. account sufficient pam_self.so
  189. account required pam_group.so no_warn group=admin,wheel fail_safe
  190. account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
  191.  
  192. Contents of /etc/pam.d/smbd (checksum 2516643123)
  193.  
  194. account required pam_sacl.so sacl_service=smb allow_trustacct
  195. session required pam_permit.so
  196.  
  197. Contents of /etc/pam.d/sshd (checksum 2989478361)
  198.  
  199. auth optional pam_krb5.so use_kcminit
  200. auth optional pam_ntlm.so try_first_pass
  201. auth optional pam_mount.so try_first_pass
  202. auth required pam_opendirectory.so try_first_pass
  203. account required pam_nologin.so
  204. account required pam_sacl.so sacl_service=ssh
  205. account required pam_opendirectory.so
  206. password required pam_opendirectory.so
  207. session required pam_launchd.so
  208. session optional pam_mount.so
  209.  
  210. Contents of /etc/pam.d/su (checksum 2045483434)
  211.  
  212. auth sufficient pam_rootok.so
  213. auth required pam_opendirectory.so
  214. account required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe
  215. account required pam_opendirectory.so no_check_shell
  216. password required pam_opendirectory.so
  217. session required pam_launchd.so
  218.  
  219. Contents of /etc/pam.d/sudo (checksum 1168067210)
  220.  
  221. auth sufficient pam_smartcard.so
  222. auth required pam_opendirectory.so
  223. account required pam_permit.so
  224. password required pam_deny.so
  225. session required pam_permit.so
  226.  
  227. Contents of /etc/periodic/daily/110.clean-tmps (checksum 4099837049)
  228.  
  229. if [ -r /etc/defaults/periodic.conf ]
  230. then
  231. . /etc/defaults/periodic.conf
  232. source_periodic_confs
  233. fi
  234. case "$daily_clean_tmps_enable" in
  235. [Yy][Ee][Ss])
  236. if [ -z "$daily_clean_tmps_days" ]
  237. then
  238. echo '$daily_clean_tmps_enable is set but' \
  239. '$daily_clean_tmps_days is not'
  240. rc=2
  241. else
  242. echo ""
  243. echo "Removing old temporary files:"
  244. set -f noglob
  245. args="-atime +$daily_clean_tmps_days -mtime +$daily_clean_tmps_days"
  246. args="${args} -ctime +$daily_clean_tmps_days"
  247. dargs="-empty -mtime +$daily_clean_tmps_days"
  248. dargs="${dargs} ! -name .vfs_rsrc_streams_*"
  249. [ -n "$daily_clean_tmps_ignore" ] && {
  250. args="$args "`echo " ${daily_clean_tmps_ignore% }" |
  251. sed 's/[ ][ ]*/ ! -name /g'`
  252. dargs="$dargs "`echo " ${daily_clean_tmps_ignore% }" |
  253. sed 's/[ ][ ]*/ ! -name /g'`
  254.  
  255. ...and 21 more line(s)
  256.  
  257. Contents of /etc/periodic/daily/130.clean-msgs (checksum 4292599426)
  258.  
  259. if [ -r /etc/defaults/periodic.conf ]
  260. then
  261. . /etc/defaults/periodic.conf
  262. source_periodic_confs
  263. fi
  264. case "$daily_clean_msgs_enable" in
  265. [Yy][Ee][Ss])
  266. if [ ! -d /var/msgs ]
  267. then
  268. echo '$daily_clean_msgs_enable is set but /var/msgs' \
  269. "doesn't exist"
  270. rc=2
  271. else
  272. echo ""
  273. echo "Cleaning out old system announcements:"
  274. [ -n "$daily_clean_msgs_days" ] &&
  275. arg=-${daily_clean_msgs_days#-} || arg=
  276. msgs -c $arg && rc=0 || rc=3
  277. fi;;
  278. *) rc=0;;
  279. esac
  280. exit $rc
  281.  
  282. Contents of /etc/periodic/daily/140.clean-rwho (checksum 659374794)
  283.  
  284. if [ -r /etc/defaults/periodic.conf ]
  285. then
  286. . /etc/defaults/periodic.conf
  287. source_periodic_confs
  288. fi
  289. case "$daily_clean_rwho_enable" in
  290. [Yy][Ee][Ss])
  291. if [ -z "$daily_clean_rwho_days" ]
  292. then
  293. echo '$daily_clean_rwho_enable is enabled but' \
  294. '$daily_clean_rwho_days is not set'
  295. rc=2
  296. elif [ ! -d /var/rwho ]
  297. then
  298. echo '$daily_clean_rwho_enable is enabled but /var/rwho' \
  299. "doesn't exist"
  300. rc=2
  301. else
  302. echo ""
  303. echo "Removing stale files from /var/rwho:"
  304. case "$daily_clean_rwho_verbose" in
  305. [Yy][Ee][Ss])
  306. print=-print;;
  307. *)
  308. print=;;
  309.  
  310. ...and 14 more line(s)
  311.  
  312. Contents of /etc/periodic/daily/199.clean-fax (checksum 1104983357)
  313.  
  314. if [ -r /etc/defaults/periodic.conf ]
  315. then
  316. . /etc/defaults/periodic.conf
  317. source_periodic_confs
  318. fi
  319. if [ -d /var/spool/fax ]; then
  320. echo ""
  321. echo "Removing scratch fax files"
  322. cd /var/spool/fax && \
  323. find . -type f -name '[0-9]*.[0-9][0-9][0-9]' -mtime +7 -delete >/dev/null 2>&1;
  324. fi
  325.  
  326. Contents of /etc/periodic/daily/310.accounting (checksum 3208203734)
  327.  
  328. if [ -r /etc/defaults/periodic.conf ]
  329. then
  330. . /etc/defaults/periodic.conf
  331. source_periodic_confs
  332. fi
  333. case "$daily_accounting_enable" in
  334. [Yy][Ee][Ss])
  335. if [ ! -f /var/account/acct ]
  336. then
  337. echo '$daily_accounting_enable is set but /var/account/acct' \
  338. "doesn't exist"
  339. rc=2
  340. elif [ -z "$daily_accounting_save" ]
  341. then
  342. echo '$daily_accounting_enable is set but ' \
  343. '$daily_accounting_save is not'
  344. rc=2
  345. else
  346. echo ""
  347. echo "Rotating accounting logs and gathering statistics:"
  348. cd /var/account
  349. rc=0
  350. n=$daily_accounting_save
  351. rm -f acct.$n.gz acct.$n || rc=3
  352. m=$n
  353.  
  354. ...and 18 more line(s)
  355.  
  356. Contents of /etc/periodic/daily/400.status-disks (checksum 1480768650)
  357.  
  358. if [ -r /etc/defaults/periodic.conf ]
  359. then
  360. . /etc/defaults/periodic.conf
  361. source_periodic_confs
  362. fi
  363. case "$daily_status_disks_enable" in
  364. [Yy][Ee][Ss])
  365. echo ""
  366. echo "Disk status:"
  367. df $daily_status_disks_df_flags && rc=1 || rc=3
  368. ;;
  369. *) rc=0;;
  370. esac
  371. exit $rc
  372.  
  373. Contents of /etc/periodic/daily/420.status-network (checksum 2730873650)
  374.  
  375. if [ -r /etc/defaults/periodic.conf ]
  376. then
  377. . /etc/defaults/periodic.conf
  378. source_periodic_confs
  379. fi
  380. case "$daily_status_network_enable" in
  381. [Yy][Ee][Ss])
  382. echo ""
  383. echo "Network interface status:"
  384. case "$daily_status_network_usedns" in
  385. [Yy][Ee][Ss])
  386. netstat -i && rc=0 || rc=3;;
  387. *)
  388. netstat -in && rc=0 || rc=3;;
  389. esac;;
  390. *) rc=0;;
  391. esac
  392. exit $rc
  393.  
  394. Contents of /etc/periodic/daily/430.status-rwho (checksum 3455351261)
  395.  
  396. if [ -r /etc/defaults/periodic.conf ]
  397. then
  398. . /etc/defaults/periodic.conf
  399. source_periodic_confs
  400. fi
  401. case "$daily_status_rwho_enable" in
  402. [Yy][Ee][Ss])
  403. rwho=$(echo /var/rwho/*)
  404. if [ -f "${rwho%% *}" ]
  405. then
  406. echo ""
  407. echo "Local network system status:"
  408. prog=ruptime
  409. else
  410. echo ""
  411. echo "Local system status:"
  412. prog=uptime
  413. fi
  414. rc=$($prog | tee /dev/stderr | wc -l)
  415. if [ $? -eq 0 ]
  416. then
  417. [ $rc -gt 1 ] && rc=1
  418. else
  419. rc=3
  420. fi;;
  421.  
  422. ...and 3 more line(s)
  423.  
  424. Contents of /etc/periodic/daily/999.local (checksum 2319755381)
  425.  
  426. if [ -r /etc/defaults/periodic.conf ]
  427. then
  428. . /etc/defaults/periodic.conf
  429. source_periodic_confs
  430. fi
  431. rc=0
  432. for script in $daily_local
  433. do
  434. echo ''
  435. case "$script" in
  436. /*)
  437. if [ -f "$script" ]
  438. then
  439. echo "Running $script:"
  440. sh $script || rc=3
  441. else
  442. echo "$script: No such file"
  443. [ $rc -lt 2 ] && rc=2
  444. fi;;
  445. *)
  446. echo "$script: Not an absolute path"
  447. [ $rc -lt 2 ] && rc=2;;
  448. esac
  449. done
  450. exit $rc
  451.  
  452. Contents of /etc/periodic/monthly/199.rotate-fax (checksum 3437454680)
  453.  
  454. if [ -r /etc/defaults/periodic.conf ]
  455. then
  456. . /etc/defaults/periodic.conf
  457. source_periodic_confs
  458. fi
  459. echo ""
  460. printf %s "Rotating fax log files:"
  461. cd /var/log/fax
  462. for i in *.log; do
  463. if [ -f "${i}" ]; then
  464. echo -n " $i"
  465. if [ -x /usr/bin/gzip ]; then gzext=".gz"; else gzext=""; fi
  466. if [ -f "${i}.3${gzext}" ]; then mv -f "${i}.3${gzext}" "${i}.4${gzext}"; fi
  467. if [ -f "${i}.2${gzext}" ]; then mv -f "${i}.2${gzext}" "${i}.3${gzext}"; fi
  468. if [ -f "${i}.1${gzext}" ]; then mv -f "${i}.1${gzext}" "${i}.2${gzext}"; fi
  469. if [ -f "${i}.0${gzext}" ]; then mv -f "${i}.0${gzext}" "${i}.1${gzext}"; fi
  470. if [ -f "${i}" ]; then mv -f "${i}" "${i}.0" && if [ -x /usr/bin/gzip ]; then gzip -9 "${i}.0"; fi; fi
  471. touch "${i}" && chmod 640 "${i}" && chown root:admin "${i}"
  472. fi
  473. done
  474. echo ""
  475.  
  476. Contents of /etc/periodic/monthly/200.accounting (checksum 3541581936)
  477.  
  478. if [ -r /etc/defaults/periodic.conf ]
  479. then
  480. . /etc/defaults/periodic.conf
  481. source_periodic_confs
  482. fi
  483. oldmask=$(umask)
  484. umask 066
  485. case "$monthly_accounting_enable" in
  486. [Yy][Ee][Ss])
  487. W=/var/log/wtmp
  488. rc=0
  489. remove=NO
  490. if [ $rc -eq 0 ]
  491. then
  492. echo ""
  493. echo "Doing login accounting:"
  494. rc=$(ac -p | sort -nr -k 2 | tee /dev/stderr | wc -l)
  495. [ $rc -gt 0 ] && rc=1
  496. fi
  497. [ $remove = YES ] && rm -f $W.0;;
  498. *) rc=0;;
  499. esac
  500. umask $oldmask
  501. exit $rc
  502.  
  503. Contents of /etc/periodic/monthly/999.local (checksum 2355967272)
  504.  
  505. if [ -r /etc/defaults/periodic.conf ]
  506. then
  507. . /etc/defaults/periodic.conf
  508. source_periodic_confs
  509. fi
  510. rc=0
  511. for script in $monthly_local
  512. do
  513. echo ''
  514. case "$script" in
  515. /*)
  516. if [ -f "$script" ]
  517. then
  518. echo "Running $script:"
  519. sh $script || rc=3
  520. else
  521. echo "$script: No such file"
  522. [ $rc -lt 2 ] && rc=2
  523. fi;;
  524. *)
  525. echo "$script: Not an absolute path"
  526. [ $rc -lt 2 ] && rc=2;;
  527. esac
  528. done
  529. exit $rc
  530.  
  531. Contents of /etc/periodic/weekly/320.whatis (checksum 922328658)
  532.  
  533. if [ -r /etc/defaults/periodic.conf ]
  534. then
  535. . /etc/defaults/periodic.conf
  536. source_periodic_confs
  537. fi
  538. case "$weekly_whatis_enable" in
  539. [Yy][Ee][Ss])
  540. echo ""
  541. echo "Rebuilding whatis database:"
  542. MANPATH=`/usr/bin/manpath -q`
  543. if [ $? = 0 ]
  544. then
  545. if [ -z "${MANPATH}" ]
  546. then
  547. echo "manpath failed to find any manpage directories"
  548. rc=3
  549. else
  550. rc=0
  551. /usr/libexec/makewhatis.local "${MANPATH}" || rc=3
  552. if [ X"${man_locales}" != X ]
  553. then
  554. for i in ${man_locales}
  555. do
  556. LC_ALL=$i /usr/libexec/makewhatis.local -a \
  557. -L "${MANPATH}" || rc=3
  558.  
  559. ...and 9 more line(s)
  560.  
  561. Contents of /etc/periodic/weekly/999.local (checksum 3078968429)
  562.  
  563. if [ -r /etc/defaults/periodic.conf ]
  564. then
  565. . /etc/defaults/periodic.conf
  566. source_periodic_confs
  567. fi
  568. rc=0
  569. for script in $weekly_local
  570. do
  571. echo ''
  572. case "$script" in
  573. /*)
  574. if [ -f "$script" ]
  575. then
  576. echo "Running $script:"
  577. sh $script || rc=3
  578. else
  579. echo "$script: No such file"
  580. [ $rc -lt 2 ] && rc=2
  581. fi;;
  582. *)
  583. echo "$script: Not an absolute path"
  584. [ $rc -lt 2 ] && rc=2;;
  585. esac
  586. done
  587. exit $rc
  588.  
  589. Contents of /Library/Preferences/com.apple.security.appsandbox.plist (checksum 2599182411)
  590.  
  591. <?xml version="1.0" encoding="UTF-8"?>
  592. <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
  593. <plist version="1.0">
  594. <dict>
  595. <key>UnrestrictSpotlightContainerScope</key>
  596. <true/>
  597. </dict>
  598. </plist>
  599.  
  600. Contents of /Library/Preferences/SystemConfiguration/com.apple.Boot.plist (checksum 1199119104)
  601.  
  602. <?xml version="1.0" encoding="UTF-8"?>
  603. <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
  604. <plist version="1.0">
  605. <dict>
  606. <key>Kernel Flags</key>
  607. <string></string>
  608. </dict>
  609. </plist>
  610.  
  611. Spotlight: Indexing and searching disabled
  612.  
  613. Restricted files: 3
  614.  
  615. Lockfiles: 2
  616.  
  617. Elapsed time (s): 101
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement