File manager - Edit - /home/antispamanakembo/public_html/tmpfiles.d.tar
Back
sos.conf 0000644 00000000165 15135263333 0006225 0 ustar 00 # Ignore the contents of extracted sosreport directories. # # Type Path Mode User Group Age Argument x /var/tmp/sos* kmod.conf 0000644 00000001062 15135263747 0006361 0 ustar 00 c! /dev/fuse 0600 - - - 10:229 c! /dev/loop-control 0600 - - - 10:237 d /dev/net 0755 - - - c! /dev/net/tun 0600 - - - 10:200 c! /dev/ppp 0600 - - - 108:0 c! /dev/uinput 0600 - - - 10:223 d /dev/mapper 0755 - - - c! /dev/mapper/control 0600 - - - 10:236 c! /dev/uhid 0600 - - - 10:239 d /dev/vfio 0755 - - - c! /dev/vfio/vfio 0600 - - - 10:196 c! /dev/vhci 0600 - - - 10:137 c! /dev/vhost-net 0600 - - - 10:238 c! /dev/vhost-vsock 0600 - - - 10:241 d /dev/snd 0755 - - - c! /dev/snd/timer 0600 - - - 116:33 d /dev/snd 0755 - - - c! /dev/snd/seq 0600 - - - 116:1 dnf.conf 0000644 00000000274 15135372406 0006173 0 ustar 00 # Unlink the dnf lock files during boot R /var/tmp/dnf*/locks/* r /var/cache/dnf/download_lock.pid r /var/cache/dnf/metadata_lock.pid r /var/lib/dnf/rpmdb_lock.pid r /var/log/log_lock.pid libselinux.conf 0000644 00000000036 15135372406 0007576 0 ustar 00 d /run/setrans 0755 root root rpm.conf 0000644 00000000026 15135372406 0006215 0 ustar 00 r /var/lib/rpm/__db.* cryptsetup.conf 0000644 00000000043 15135372406 0007640 0 ustar 00 d /run/cryptsetup 0700 root root - dbus.conf 0000644 00000000555 15135372406 0006363 0 ustar 00 # Fields: type; path; mode; uid; gid; age; argument (symlink target) # Make ${localstatedir}/lib/dbus (required for systemd < 237) # Adjust mode and ownership if it already exists. d /var/lib/dbus 0755 - - - # Make ${localstatedir}/lib/dbus/machine-id a symlink to /etc/machine-id # if it does not already exist L /var/lib/dbus/machine-id - - - - /etc/machine-id pam.conf 0000644 00000000201 15135372406 0006167 0 ustar 00 d /run/console 0755 root root - d /run/faillock 0755 root root - d /run/sepermit 0755 root root - d /run/motd.d 0755 root root - etc.conf 0000644 00000001003 15135372406 0006166 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details L /etc/os-release - - - - ../usr/lib/os-release L /etc/localtime - - - - ../usr/share/zoneinfo/UTC L+ /etc/mtab - - - - ../proc/self/mounts C /etc/nsswitch.conf - - - - C /etc/pam.d - - - - home.conf 0000644 00000000552 15135372406 0006353 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details Q /home 0755 - - - q /srv 0755 - - - journal-nocow.conf 0000644 00000002110 15135372406 0010210 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Set the NOCOW attribute for directories of journal files. This flag # is inherited by their new files and sub-directories. Matters only # for btrfs filesystems. # # WARNING: Enabling the NOCOW attribute improves journal performance # substantially, but also disables the btrfs checksum logic. In # btrfs RAID filesystems the checksums are needed for rebuilding # corrupted files. Without checksums such rebuilds are not # possible. # # In a single-disk filesystem (or a filesystem without redundancy) # enabling the NOCOW attribute for journal files is safe, because # they have their own checksums and a rebuilding wouldn't be possible # in any case. h /var/log/journal - - - - +C h /var/log/journal/%m - - - - +C h /var/log/journal/remote - - - - +C legacy.conf 0000644 00000001511 15135372406 0006663 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # These files are considered legacy and are unnecessary on legacy-free # systems. d /run/lock 0755 root root - L /var/lock - - - - ../run/lock # /run/lock/subsys is used for serializing SysV service execution, and # hence without use on SysV-less systems. d /run/lock/subsys 0755 root root - # /forcefsck, /fastboot and /forcequotacheck are deprecated in favor of the # kernel command line options 'fsck.mode=force', 'fsck.mode=skip' and # 'quotacheck.mode=force' r! /forcefsck r! /fastboot r! /forcequotacheck portables.conf 0000644 00000000140 15135372406 0007407 0 ustar 00 # SPDX-License-Identifier: LGPL-2.1+ # See tmpfiles.d(5) for details Q /var/lib/portables 0700 systemd-nologin.conf 0000644 00000001124 15135372406 0010552 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5), systemd-user-session.service(5) and pam_nologin(8). # This file has special suffix so it is not run by mistake. F! /run/nologin 0644 - - - "System is booting up. Unprivileged users are not permitted to log in yet. Please come back later. For technical details, see pam_nologin(8)." systemd-pstore.conf 0000644 00000002742 15135372406 0010430 0 ustar 00 # SPDX-License-Identifier: LGPL-2.1+ # # The systemd-pstore.service(1) archives the contents of /sys/fs/pstore # upon boot so that there is room for a subsequent dump. This service # is enabled with: # systemctl enable systemd-pstore # # With the service enabled, the kernel still needs to be configured # to write data into the pstore. The kernel has two parameters, # crash_kexec_post_notifiers and printk.always_kmsg_dump, that # control writes into pstore. # # The crash_kexec_post_notifiers parameter enables the kernel to write # dmesg (including stack trace) into pstore upon a panic even if kdump # is loaded, only needed if you want to use pstore with kdump. Without # this parameter, kdump could block writing to pstore for stability # reason. Note this increases the risk of kdump failure even if pstore # is not available. # # The printk.always_kmsg_dump parameter enables the kernel to write dmesg # upon a normal shutdown (shutdown, reboot, halt). # # To configure the kernel parameters, uncomment the appropriate # line(s) below. The value written is either 'Y' to enable the # kernel parameter, or 'N' to disable the kernel parameter. # # After making a change to this file, do: # systemd-tmpfiles --create path/to/tmpfiles.d/systemd-pstore.conf # # These changes are automatically applied on future re-boots. d /var/lib/systemd/pstore 0755 root root 14d #w- /sys/module/printk/parameters/always_kmsg_dump - - - - Y #w- /sys/module/kernel/parameters/crash_kexec_post_notifiers - - - - Y systemd.conf 0000644 00000003214 15135372406 0007111 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details d /run/user 0755 root root - F! /run/utmp 0664 root utmp - d /run/systemd/ask-password 0755 root root - d /run/systemd/seats 0755 root root - d /run/systemd/sessions 0755 root root - d /run/systemd/users 0755 root root - d /run/systemd/machines 0755 root root - d /run/systemd/shutdown 0755 root root - d /run/log 0755 root root - z /run/log/journal 2755 root systemd-journal - - Z /run/log/journal/%m ~2750 root systemd-journal - - a+ /run/log/journal/%m - - - - d:group:adm:r-x,d:group:wheel:r-x a+ /run/log/journal/%m - - - - group:adm:r-x,group:wheel:r-x a+ /run/log/journal/%m/*.journal* - - - - group:adm:r--,group:wheel:r-- z /var/log/journal 2755 root systemd-journal - - z /var/log/journal/%m 2755 root systemd-journal - - z /var/log/journal/%m/system.journal 0640 root systemd-journal - - a+ /var/log/journal - - - - d:group::r-x,d:group:adm:r-x,d:group:wheel:r-x a+ /var/log/journal - - - - group::r-x,group:adm:r-x,group:wheel:r-x a+ /var/log/journal/%m - - - - d:group:adm:r-x,d:group:wheel:r-x a+ /var/log/journal/%m - - - - group:adm:r-x,group:wheel:r-x a+ /var/log/journal/%m/system.journal - - - - group:adm:r--,group:wheel:r-- d /var/lib/systemd 0755 root root - d /var/lib/systemd/coredump 0755 root root 3d d /var/lib/private 0700 root root - d /var/log/private 0700 root root - d /var/cache/private 0700 root root - tmp.conf 0000644 00000001365 15135372406 0006226 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Clear tmp directories separately, to make them easier to override q /tmp 1777 root root 10d q /var/tmp 1777 root root 30d # Exclude namespace mountpoints created with PrivateTmp=yes x /tmp/systemd-private-%b-* X /tmp/systemd-private-%b-*/tmp x /var/tmp/systemd-private-%b-* X /var/tmp/systemd-private-%b-*/tmp # Remove top-level private temporary directories on each boot R! /tmp/systemd-private-* R! /var/tmp/systemd-private-* var.conf 0000644 00000001070 15135372406 0006207 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details q /var 0755 - - - L /var/run - - - - ../run d /var/log 0755 - - - f /var/log/wtmp 0664 root utmp - f /var/log/btmp 0660 root utmp - f /var/log/lastlog 0664 root utmp - d /var/cache 0755 - - - d /var/lib 0755 - - - d /var/spool 0755 - - - x11.conf 0000644 00000001217 15135372406 0006033 0 ustar 00 # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. # See tmpfiles.d(5) for details # Make sure these are created by default so that nobody else can # or empty them at startup D! /tmp/.X11-unix 1777 root root 10d D! /tmp/.ICE-unix 1777 root root 10d D! /tmp/.XIM-unix 1777 root root 10d D! /tmp/.font-unix 1777 root root 10d D! /tmp/.Test-unix 1777 root root 10d # Unlink the X11 lock files r! /tmp/.X[0-9]*-lock selinux-policy.conf 0000644 00000000211 15135372406 0010377 0 ustar 00 z /sys/devices/system/cpu/online - - - Z /sys/class/net - - - z /sys/kernel/uevent_helper - - - w /sys/fs/selinux/checkreqprot - - - - 0 mdadm.conf 0000644 00000000036 15135372406 0006502 0 ustar 00 d /run/mdadm 0710 root root - udisks2.conf 0000644 00000000034 15135372406 0007002 0 ustar 00 d /run/media 0755 root root tuned.conf 0000644 00000000070 15135372406 0006535 0 ustar 00 # tuned runtime directory d /run/tuned 0755 root root - openssh.conf 0000644 00000000042 15135372406 0007074 0 ustar 00 d /var/empty/sshd 711 root root - sudo.conf 0000644 00000000461 15135372406 0006374 0 ustar 00 # Create an empty sudo time stamp directory on OSes using systemd. # Sudo will create the directory itself but this can cause problems # on systems that have SELinux enabled since the directories will be # created with the user's security context. d /run/sudo 0711 root root D /run/sudo/ts 0700 root root man-db.conf 0000644 00000000043 15135372406 0006554 0 ustar 00 d /var/cache/man 0755 root root 1w cloud-init.conf 0000644 00000000045 15135372406 0007467 0 ustar 00 d /run/cloud-init 0700 root root - - rpcbind.conf 0000644 00000000127 15135372406 0007042 0 ustar 00 #Type Path Mode UID GID Age Argument D /run/rpcbind 0700 rpc rpc - - cockpit-tempfiles.conf 0000644 00000000257 15135372406 0011047 0 ustar 00 C /run/cockpit/inactive.motd 0640 root wheel - /usr/share/cockpit/motd/inactive.motd f /run/cockpit/active.motd 0640 root wheel - L+ /run/cockpit/motd - - - - inactive.motd nscd.conf 0000644 00000000033 15135372406 0006344 0 ustar 00 d /run/nscd 0755 root root named.conf 0000644 00000000040 15135372406 0006477 0 ustar 00 d /run/named 0755 named named - mariadb.conf 0000644 00000000673 15135372406 0007026 0 ustar 00 # This is the directory where the unix socket # of MariaDB may be created. # # Under Galera this is where an envfile of # the Galera start position is stored. # # Other temporary directories can be created here like: # * tmpdir # * innodb_tmpdir # * innodb_temp_data_file_path # * rocksdb_tmpdir # etc. # It shouldn't be used for datadir which is why it # may be disabled. d /run/mariadb 0755 mysql mysql - #d /var/lib/mysql 0755 mysql root - apache2.conf 0000644 00000000121 15135372406 0006716 0 ustar 00 d /run/apache2 710 root nobody d /run/apache2/htcacheclean 700 nobody nobody plesk-lmlib.conf 0000644 00000000052 15135372406 0007631 0 ustar 00 d /run/lock/lmlib/ 0770 root lock-manager setroubleshoot.conf 0000644 00000000072 15135372406 0010501 0 ustar 00 d /run/setroubleshoot 711 setroubleshoot setroubleshoot -
| ver. 1.4 |
Github
|
.
| PHP 8.1.34 | Generation time: 0 |
proxy
|
phpinfo
|
Settings