Top Forums UNIX for Dummies Questions & Answers Soft and hard limits for nproc value in /etc/security/limits.conf file (Linux ) Post 302949617 by MadeInGermany on Tuesday 14th of July 2015 01:46:31 AM
If you hit the limit then further fork(),clone() etc. are denied and return EAGAIN.
This User Gave Thanks to MadeInGermany For This Post:
Test Your Knowledge in Computers #200
Difficulty: Easy
Larry Wall began work on Perl in 1977.
True or False?

10 More Discussions You Might Find Interesting

1. Linux


Hello! How do make the limits.conf parameters work for a normal user. Ive changed both the hard and soft parameter for the specific user. It used to be 4096 and i changed it to 16384. But when i use the ulimit -n, all i got is permissen denied. Witch i can understand. But my question is? how... (1 Reply)
Discussion started by: dozy
1 Replies

2. UNIX for Dummies Questions & Answers


I have line in this file that says: username - maxlogins 1 and user can login 2 times instad of one. does enybody know why? and how can I fix that? (2 Replies)
Discussion started by: shooroop
2 Replies

3. UNIX for Advanced & Expert Users


HI, To restrict the number of files and number of processes used the user we use the following configuration in the file /etc/security/limits.conf. oracle soft nofile 65572 oracle hard nofile 65572 oracle soft noproc 16384 oracle soft noproc 16384 My question is what do the 'soft' and... (1 Reply)
Discussion started by: praveen_b744
1 Replies

4. Solaris

Solaris counterpart of /etc/security/limits.conf

Hi, How can we set per user core file size, etc in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf. TIA (0 Replies)
Discussion started by: slash_blog
0 Replies

5. UNIX for Dummies Questions & Answers

ulimit and /etc/security/limits file permission

Hi there, I am working on AIX and i dont have permission for /etc/security/limits file. In the man page of ulimit it is mentioned that it will get the limitations for me from /etc/security/limits file. the file permission for ulimit command is -r-xr-xr-x 15 bin bin ... (6 Replies)
Discussion started by: quintet
6 Replies

6. Red Hat

Modifying limits.conf & pam.d

Hello all, I'm running Oracle 10.2 on RHEL5. Current value of ulimit -n is set to a low value of 1024. I need to increase it to 65536 using the following procedure. cat >> /etc/security/limits.conf <<EOF oracle soft nproc 2047 oracle hard nproc 16384 oracle soft nofile 1024 oracle hard... (3 Replies)
Discussion started by: luft
3 Replies

7. Linux

/etc/security/limits.conf NIS netgroup support

Hi there, I am trying to set a ulimit max in the /etc/security/limits.conf against a NIS netgroup (which contains a whole bunch of users) instead of a local user or group. so I have a NIS netgroup called +@myusers , none of whose users are defined locally on the box. I want to ensure that... (2 Replies)
Discussion started by: rethink
2 Replies

8. Solaris

equivalent of linux /etc/security/limits

Hi, I would like to know, how can I set limits (noproc,fsize,core, data...) to users in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf Thanks!! (0 Replies)
Discussion started by: kiekurt
0 Replies

9. Linux

Determining Values for NIce and Priority items in limits.conf file

I've been looking online trying to find the correct value nice and priority can take in the limits.conf file. ON the man page it says; Does this mean priority can be any negative number and any positive? Then Does this mean any number between -20 and 19 also what does the definition of nice... (13 Replies)
Discussion started by: matthewfs
13 Replies

10. Red Hat

Cannot set 'soft limits' for 'maximum stack size' for a standard user

Hi Guys, I'm trying to install Oracle Database on to Oracle Linux 7.6 but when the database install package checks the OS set-up, it keeps on failing on the soft limits for the stack. It's default value is 8192 but I'm trying to set it to 10240. This is what I added to... (2 Replies)
Discussion started by: ASGR
2 Replies
pam_user.conf(4)					     Kernel Interfaces Manual						  pam_user.conf(4)

pam_user.conf - user configuration file for pluggable authentication modules SYNOPSIS
is the user configuration file for the Pluggable Authentication Module architecture, or PAM. It is not designed to replace the PAM system configuration file, For PAM to work properly, is mandatory (see pam.conf(4)). is optional. It is used only when a user basis configura- tion is needed. It mainly specifies options to be used by service modules on a user basis. The options defined in indicate the default for users who are not configured in or if the module type is not configured for some users. For the configuration in to take effect, needs to configure service module (see pam.conf(4)). Simplified pam_user.conf Configuration File The file contains a listing of login names. Each login name is paired with a corresponding service module with or without options speci- fied. Each entry has the following format: login_name module_type module_path options Below is an example of the configuration file. tom auth /usr/lib/security/$ISA/ debug use_psd tom auth /usr/lib/security/$ISA/ use_first_pass tom account /usr/lib/security/$ISA/ use_psd tom account /usr/lib/security/$ISA/ try_first_pass susan auth /usr/lib/security/$ISA/ susan auth /usr/lib/security/$ISA/ try_first_pass The login_name denotes the login name of a user (for example, For detailed information on module_type, module_path, and options, see pam.conf(4). The first entry indicates that when the UNIX authentication is invoked for the options and will be used. The second entry indicates that when the DCE authentication is invoked for the option will be used. The module type is not configured for therefore, the options will take effect. For those users who are not configured, the options apply. Notes If an error is found in an entry due to invalid login_name or module_type, then the entry is ignored. If there are no valid entries for the given module_type, the PAM framework ignores and reads the configuration in EXAMPLES
The following is a sample configuration file. Lines that begin with the symbol are treated as comments, and therefore ignored. # # PAM user configuration # # Authentication management john auth /usr/lib/security/$ISA/ john auth /usr/lib/security/$ISA/ try_first_pass david auth /usr/lib/security/$ISA/ use_psd david auth /usr/lib/security/$ISA/ try_first_pass susan auth /usr/lib/security/$ISA/ use_psd susan auth /usr/lib/security/$ISA/ try_first_pass # Password management john password /usr/lib/security/$ISA/ david password /usr/lib/security/$ISA/ use_psd susan password /usr/lib/security/$ISA/ use_psd SEE ALSO
pam(3), pam.conf(4). pam_user.conf(4)

Featured Tech Videos

All times are GMT -4. The time now is 12:46 PM.
Unix & Linux Forums Content Copyright 1993-2020. All Rights Reserved.
Privacy Policy