uawdijnntqw1x1x1
IP : 216.73.216.110
Hostname : 6.87.74.97.host.secureserver.net
Kernel : Linux 6.87.74.97.host.secureserver.net 4.18.0-553.83.1.el8_10.x86_64 #1 SMP Mon Nov 10 04:22:44 EST 2025 x86_64
Disable Function : None :)
OS : Linux
PATH:
/
home
/
emeraadmin
/
.caldav
/
..
/
public_html
/
.
/
node_modules
/
ionicons
/
..
/
..
/
4d695
/
tmpfiles.d.tar
/
/
kmod.conf000064400000001062151700143710006343 0ustar00c! /dev/fuse 0600 - - - 10:229 c! /dev/loop-control 0600 - - - 10:237 d /dev/net 0755 - - - c! /dev/net/tun 0600 - - - 10:200 c! /dev/ppp 0600 - - - 108:0 c! /dev/uinput 0600 - - - 10:223 d /dev/mapper 0755 - - - c! /dev/mapper/control 0600 - - - 10:236 c! /dev/uhid 0600 - - - 10:239 d /dev/vfio 0755 - - - c! /dev/vfio/vfio 0600 - - - 10:196 c! /dev/vhci 0600 - - - 10:137 c! /dev/vhost-net 0600 - - - 10:238 c! /dev/vhost-vsock 0600 - - - 10:241 d /dev/snd 0755 - - - c! /dev/snd/timer 0600 - - - 116:33 d /dev/snd 0755 - - - c! /dev/snd/seq 0600 - - - 116:1 dnf.conf000064400000000274151701436030006165 0ustar00# Unlink the dnf lock files during boot R /var/tmp/dnf*/locks/* r /var/cache/dnf/download_lock.pid r /var/cache/dnf/metadata_lock.pid r /var/lib/dnf/rpmdb_lock.pid r /var/log/log_lock.pid libselinux.conf000064400000000036151701436030007570 0ustar00d /run/setrans 0755 root root rpm.conf000064400000000026151701436030006207 0ustar00r /var/lib/rpm/__db.* cryptsetup.conf000064400000000043151701436030007632 0ustar00d /run/cryptsetup 0700 root root - dbus.conf000064400000000555151701436030006355 0ustar00# Fields: type; path; mode; uid; gid; age; argument (symlink target) # Make ${localstatedir}/lib/dbus (required for systemd < 237) # Adjust mode and ownership if it already exists. d /var/lib/dbus 0755 - - - # Make ${localstatedir}/lib/dbus/machine-id a symlink to /etc/machine-id # if it does not already exist L /var/lib/dbus/machine-id - - - - /etc/machine-id pam.conf000064400000000201151701436030006161 0ustar00d /run/console 0755 root root - d /run/faillock 0755 root root - d /run/sepermit 0755 root root - d /run/motd.d 0755 root root - etc.conf000064400000001003151701436030006160 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details L /etc/os-release - - - - ../usr/lib/os-release L /etc/localtime - - - - ../usr/share/zoneinfo/UTC L+ /etc/mtab - - - - ../proc/self/mounts C /etc/nsswitch.conf - - - - C /etc/pam.d - - - - home.conf000064400000000552151701436030006345 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details Q /home 0755 - - - q /srv 0755 - - - journal-nocow.conf000064400000002110151701436030010202 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Set the NOCOW attribute for directories of journal files. This flag # is inherited by their new files and sub-directories. Matters only # for btrfs filesystems. # # WARNING: Enabling the NOCOW attribute improves journal performance # substantially, but also disables the btrfs checksum logic. In # btrfs RAID filesystems the checksums are needed for rebuilding # corrupted files. Without checksums such rebuilds are not # possible. # # In a single-disk filesystem (or a filesystem without redundancy) # enabling the NOCOW attribute for journal files is safe, because # they have their own checksums and a rebuilding wouldn't be possible # in any case. h /var/log/journal - - - - +C h /var/log/journal/%m - - - - +C h /var/log/journal/remote - - - - +C legacy.conf000064400000001511151701436030006655 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # These files are considered legacy and are unnecessary on legacy-free # systems. d /run/lock 0755 root root - L /var/lock - - - - ../run/lock # /run/lock/subsys is used for serializing SysV service execution, and # hence without use on SysV-less systems. d /run/lock/subsys 0755 root root - # /forcefsck, /fastboot and /forcequotacheck are deprecated in favor of the # kernel command line options 'fsck.mode=force', 'fsck.mode=skip' and # 'quotacheck.mode=force' r! /forcefsck r! /fastboot r! /forcequotacheck portables.conf000064400000000140151701436030007401 0ustar00# SPDX-License-Identifier: LGPL-2.1+ # See tmpfiles.d(5) for details Q /var/lib/portables 0700 systemd-nologin.conf000064400000001124151701436030010544 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5), systemd-user-session.service(5) and pam_nologin(8). # This file has special suffix so it is not run by mistake. F! /run/nologin 0644 - - - "System is booting up. Unprivileged users are not permitted to log in yet. Please come back later. For technical details, see pam_nologin(8)." systemd-pstore.conf000064400000002742151701436030010422 0ustar00# SPDX-License-Identifier: LGPL-2.1+ # # The systemd-pstore.service(1) archives the contents of /sys/fs/pstore # upon boot so that there is room for a subsequent dump. This service # is enabled with: # systemctl enable systemd-pstore # # With the service enabled, the kernel still needs to be configured # to write data into the pstore. The kernel has two parameters, # crash_kexec_post_notifiers and printk.always_kmsg_dump, that # control writes into pstore. # # The crash_kexec_post_notifiers parameter enables the kernel to write # dmesg (including stack trace) into pstore upon a panic even if kdump # is loaded, only needed if you want to use pstore with kdump. Without # this parameter, kdump could block writing to pstore for stability # reason. Note this increases the risk of kdump failure even if pstore # is not available. # # The printk.always_kmsg_dump parameter enables the kernel to write dmesg # upon a normal shutdown (shutdown, reboot, halt). # # To configure the kernel parameters, uncomment the appropriate # line(s) below. The value written is either 'Y' to enable the # kernel parameter, or 'N' to disable the kernel parameter. # # After making a change to this file, do: # systemd-tmpfiles --create path/to/tmpfiles.d/systemd-pstore.conf # # These changes are automatically applied on future re-boots. d /var/lib/systemd/pstore 0755 root root 14d #w- /sys/module/printk/parameters/always_kmsg_dump - - - - Y #w- /sys/module/kernel/parameters/crash_kexec_post_notifiers - - - - Y systemd.conf000064400000003214151701436030007103 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details d /run/user 0755 root root - F! /run/utmp 0664 root utmp - d /run/systemd/ask-password 0755 root root - d /run/systemd/seats 0755 root root - d /run/systemd/sessions 0755 root root - d /run/systemd/users 0755 root root - d /run/systemd/machines 0755 root root - d /run/systemd/shutdown 0755 root root - d /run/log 0755 root root - z /run/log/journal 2755 root systemd-journal - - Z /run/log/journal/%m ~2750 root systemd-journal - - a+ /run/log/journal/%m - - - - d:group:adm:r-x,d:group:wheel:r-x a+ /run/log/journal/%m - - - - group:adm:r-x,group:wheel:r-x a+ /run/log/journal/%m/*.journal* - - - - group:adm:r--,group:wheel:r-- z /var/log/journal 2755 root systemd-journal - - z /var/log/journal/%m 2755 root systemd-journal - - z /var/log/journal/%m/system.journal 0640 root systemd-journal - - a+ /var/log/journal - - - - d:group::r-x,d:group:adm:r-x,d:group:wheel:r-x a+ /var/log/journal - - - - group::r-x,group:adm:r-x,group:wheel:r-x a+ /var/log/journal/%m - - - - d:group:adm:r-x,d:group:wheel:r-x a+ /var/log/journal/%m - - - - group:adm:r-x,group:wheel:r-x a+ /var/log/journal/%m/system.journal - - - - group:adm:r--,group:wheel:r-- d /var/lib/systemd 0755 root root - d /var/lib/systemd/coredump 0755 root root 3d d /var/lib/private 0700 root root - d /var/log/private 0700 root root - d /var/cache/private 0700 root root - tmp.conf000064400000001365151701436030006220 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Clear tmp directories separately, to make them easier to override q /tmp 1777 root root 10d q /var/tmp 1777 root root 30d # Exclude namespace mountpoints created with PrivateTmp=yes x /tmp/systemd-private-%b-* X /tmp/systemd-private-%b-*/tmp x /var/tmp/systemd-private-%b-* X /var/tmp/systemd-private-%b-*/tmp # Remove top-level private temporary directories on each boot R! /tmp/systemd-private-* R! /var/tmp/systemd-private-* var.conf000064400000001070151701436030006201 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details q /var 0755 - - - L /var/run - - - - ../run d /var/log 0755 - - - f /var/log/wtmp 0664 root utmp - f /var/log/btmp 0660 root utmp - f /var/log/lastlog 0664 root utmp - d /var/cache 0755 - - - d /var/lib 0755 - - - d /var/spool 0755 - - - x11.conf000064400000001217151701436030006025 0ustar00# This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Make sure these are created by default so that nobody else can # or empty them at startup D! /tmp/.X11-unix 1777 root root 10d D! /tmp/.ICE-unix 1777 root root 10d D! /tmp/.XIM-unix 1777 root root 10d D! /tmp/.font-unix 1777 root root 10d D! /tmp/.Test-unix 1777 root root 10d # Unlink the X11 lock files r! /tmp/.X[0-9]*-lock selinux-policy.conf000064400000000211151701436030010371 0ustar00z /sys/devices/system/cpu/online - - - Z /sys/class/net - - - z /sys/kernel/uevent_helper - - - w /sys/fs/selinux/checkreqprot - - - - 0 tuned.conf000064400000000070151701436030006527 0ustar00# tuned runtime directory d /run/tuned 0755 root root - openssh.conf000064400000000042151701436030007066 0ustar00d /var/empty/sshd 711 root root - sudo.conf000064400000000461151701436030006366 0ustar00# Create an empty sudo time stamp directory on OSes using systemd. # Sudo will create the directory itself but this can cause problems # on systems that have SELinux enabled since the directories will be # created with the user's security context. d /run/sudo 0711 root root D /run/sudo/ts 0700 root root man-db.conf000064400000000043151701436030006546 0ustar00d /var/cache/man 0755 root root 1w nscd.conf000064400000000033151701436030006336 0ustar00d /run/nscd 0755 root root named.conf000064400000000040151701436030006471 0ustar00d /run/named 0755 named named - plesk-lmlib.conf000064400000000052151701436030007623 0ustar00d /run/lock/lmlib/ 0770 root lock-manager apache2.conf000064400000000121151701436030006710 0ustar00d /run/apache2 710 root nobody d /run/apache2/htcacheclean 700 nobody nobody mysql.conf000064400000002300151701436030006553 0ustar00# Copyright (c) 2015, 2025, Oracle and/or its affiliates. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License, version 2.0, # as published by the Free Software Foundation. # # This program is designed to work with certain software (including # but not limited to OpenSSL) that is licensed under separate terms, # as designated in a particular file or component or in included license # documentation. The authors of MySQL hereby grant you an additional # permission to link the program and your derivative works with the # separately licensed software that they have either included with # the program or referenced in the documentation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License, version 2.0, for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA d /run/mysqld 0755 mysql mysql - rpcbind.conf000064400000000127151701436030007034 0ustar00#Type Path Mode UID GID Age Argument D /run/rpcbind 0700 rpc rpc - -
/home/emeraadmin/.caldav/../public_html/./node_modules/ionicons/../../4d695/tmpfiles.d.tar