Sponsored Content
Full Discussion: Setting Ulimit problem
Top Forums UNIX for Advanced & Expert Users Setting Ulimit problem Post 302421240 by zaxxon on Friday 14th of May 2010 12:28:31 AM
Old 05-14-2010
Did you relog?
This User Gave Thanks to zaxxon For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

ulimit problem

i've encountered the following problem with sco unixware7. after using the "ulimit -f unlimited" command and then using "ulimit -a" it lists the filesize as unlimited. BUT, when type the ulimit command without parameters, the output is given as 4194303 so i can't create a file bigger than... (4 Replies)
Discussion started by: roydv
4 Replies

2. Solaris

ulimit setting problem on Solaris

How do you make the ulimit values permanent for a user? by default, the root login has the following ulimits: # ulimit -a time(seconds) unlimited file(blocks) unlimited data(kbytes) unlimited stack(kbytes) 8192 coredump(blocks) unlimited nofiles(descriptors) 1024 memory(kbytes)... (2 Replies)
Discussion started by: kiem
2 Replies

3. Programming

ulimit problem

I would like to know where is the ulimit value stored in the shell. And how to get or modify it using the C program. I run the command ulimit it shows me unlimited and quits. Where that value is stored. Thanks (1 Reply)
Discussion started by: mobile01
1 Replies

4. Shell Programming and Scripting

Setting Ulimit

How do i set ulimit for user (4 Replies)
Discussion started by: Krrishv
4 Replies

5. SCO

problem with ulimit

hi, i cant set ULIMIT for normal user (file size more than 2gb).but in root user it is working fine.in user it is giving error like "limit exceeded (priviledged user)". (2 Replies)
Discussion started by: prakrithi
2 Replies

6. UNIX for Advanced & Expert Users

setting ulimit -n with a value more than 1024000

I would like to set the maximum number or open files per process to be greater than 1024000 (for specific application scalability purpose). I am using RHEL 5.3/Ext4. %sysctl fs.file-max fs.file-max = 164766821 I also have added the folloing to /etc/security/limits.conf * ... (7 Replies)
Discussion started by: Hsianglung Wu
7 Replies

7. UNIX for Advanced & Expert Users

Help with Ulimit Setting

All, Our SA is considering setting the max open files from 2048 to 30K. This sounds like a drastic change. Does anybody have an idea of the negative impacts of increasing the open files too high? Would like to know if this change could negatively impact our system. What test should we run to... (2 Replies)
Discussion started by: wcrober
2 Replies

8. Red Hat

setting ulimit for a user

The root user runs the following ulimit -a | grep open and gets a result of open files (-n) 8162 A user runs the same command and gets a result of open files (-n) 2500 How can you set the ulimit of the user to... (2 Replies)
Discussion started by: jsanders
2 Replies

9. AIX

Ulimit setting

Hi, Our application team is asking me to set ulimit parameter in my AIX 6.1 TL8 box. Some of them i set already. address space limit (kbytes) (-M) unlimited locks (-L) unlimited locked address space (kbytes) (-l) 64 nice (-e) ... (3 Replies)
Discussion started by: sunnybee
3 Replies

10. Solaris

Help with setting coredumpsize using ulimit

A coredump is being created by one of our applications on Solaris server and occupying entire space on the mount, thereby bringing down the application. While we try to identify the root cause, i tried to limit to limit the size of the core dump. Executed below command in shell and also updated... (2 Replies)
Discussion started by: kesani
2 Replies
avc_context_to_sid(3)					     SELinux API documentation					     avc_context_to_sid(3)

NAME
avc_context_to_sid, avc_sid_to_context, avc_get_initial_sid - obtain and manipulate SELinux security ID's SYNOPSIS
#include <selinux/selinux.h> #include <selinux/avc.h> int avc_context_to_sid(security_context_t ctx, security_id_t *sid); int avc_sid_to_context(security_id_t sid, security_context_t *ctx); int avc_get_initial_sid(const char *name, security_id_t *sid); DESCRIPTION
Security ID's (SID's) are opaque representations of security contexts, managed by the userspace AVC. avc_context_to_sid() returns a SID for the given context in the memory referenced by sid. avc_sid_to_context() returns a copy of the context represented by sid in the memory referenced by ctx. The user must free the copy with freecon(3). avc_get_initial_sid() returns a SID for the kernel initial security identifier specified by name. RETURN VALUE
avc_context_to_sid() and avc_sid_to_context() return zero on success. On error, -1 is returned and errno is set appropriately. ERRORS
ENOMEM An attempt to allocate memory failed. NOTES
As of libselinux version 2.0.86, SID's are no longer reference counted. A SID will be valid from the time it is first obtained until the next call to avc_destroy(3). The sidget(3) and sidput(3) functions, formerly used to adjust the reference count, are no-ops and are depre- cated. AUTHOR
Eamon Walsh <ewalsh@tycho.nsa.gov> SEE ALSO
avc_init(3), avc_has_perm(3), avc_cache_stats(3), avc_add_callback(3), getcon(3), freecon(3), selinux(8) 27 May 2004 avc_context_to_sid(3)
All times are GMT -4. The time now is 11:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy