Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Soft and hard limits for nproc value in /etc/security/limits.conf file (Linux ) Post 302949617 by MadeInGermany on Tuesday 14th of July 2015 01:46:31 AM
Old 07-14-2015
If you hit the limit then further fork(),clone() etc. are denied and return EAGAIN.
This User Gave Thanks to MadeInGermany For This Post:
 

10 More Discussions You Might Find Interesting

1. Linux

limits.conf

Hello! How do make the limits.conf parameters work for a normal user. Ive changed both the hard and soft parameter for the specific user. It used to be 4096 and i changed it to 16384. But when i use the ulimit -n, all i got is permissen denied. Witch i can understand. But my question is? how... (1 Reply)
Discussion started by: dozy
1 Replies

2. UNIX for Dummies Questions & Answers

limits.conf

I have line in this file that says: username - maxlogins 1 and user can login 2 times instad of one. does enybody know why? and how can I fix that? (2 Replies)
Discussion started by: shooroop
2 Replies

3. UNIX for Advanced & Expert Users

/etc/security/limits.conf

HI, To restrict the number of files and number of processes used the user we use the following configuration in the file /etc/security/limits.conf. oracle soft nofile 65572 oracle hard nofile 65572 oracle soft noproc 16384 oracle soft noproc 16384 My question is what do the 'soft' and... (1 Reply)
Discussion started by: praveen_b744
1 Replies

4. Solaris

Solaris counterpart of /etc/security/limits.conf

Hi, How can we set per user core file size, etc in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf. TIA (0 Replies)
Discussion started by: slash_blog
0 Replies

5. UNIX for Dummies Questions & Answers

ulimit and /etc/security/limits file permission

Hi there, I am working on AIX and i dont have permission for /etc/security/limits file. In the man page of ulimit it is mentioned that it will get the limitations for me from /etc/security/limits file. the file permission for ulimit command is -r-xr-xr-x 15 bin bin ... (6 Replies)
Discussion started by: quintet
6 Replies

6. Red Hat

Modifying limits.conf & pam.d

Hello all, I'm running Oracle 10.2 on RHEL5. Current value of ulimit -n is set to a low value of 1024. I need to increase it to 65536 using the following procedure. cat >> /etc/security/limits.conf <<EOF oracle soft nproc 2047 oracle hard nproc 16384 oracle soft nofile 1024 oracle hard... (3 Replies)
Discussion started by: luft
3 Replies

7. Linux

/etc/security/limits.conf NIS netgroup support

Hi there, I am trying to set a ulimit max in the /etc/security/limits.conf against a NIS netgroup (which contains a whole bunch of users) instead of a local user or group. so I have a NIS netgroup called +@myusers , none of whose users are defined locally on the box. I want to ensure that... (2 Replies)
Discussion started by: rethink
2 Replies

8. Solaris

equivalent of linux /etc/security/limits

Hi, I would like to know, how can I set limits (noproc,fsize,core, data...) to users in solaris, i.e. I want solaris counterpart/equivalent of linux /etc/security/limits.conf Thanks!! (0 Replies)
Discussion started by: kiekurt
0 Replies

9. Linux

Determining Values for NIce and Priority items in limits.conf file

I've been looking online trying to find the correct value nice and priority can take in the limits.conf file. ON the man page it says; Does this mean priority can be any negative number and any positive? Then Does this mean any number between -20 and 19 also what does the definition of nice... (13 Replies)
Discussion started by: matthewfs
13 Replies

10. Red Hat

Cannot set 'soft limits' for 'maximum stack size' for a standard user

Hi Guys, I'm trying to install Oracle Database on to Oracle Linux 7.6 but when the database install package checks the OS set-up, it keeps on failing on the soft limits for the stack. It's default value is 8192 but I'm trying to set it to 10240. This is what I added to... (2 Replies)
Discussion started by: ASGR
2 Replies
RFORK(2)						      BSD System Calls Manual							  RFORK(2)

NAME
rfork -- manipulate process resources LIBRARY
Standard C Library (libc, -lc) SYNOPSIS
#include <unistd.h> pid_t rfork(int flags); DESCRIPTION
Forking, vforking or rforking are the only ways new processes are created. The flags argument to rfork() selects which resources of the invoking process (parent) are shared by the new process (child) or initialized to their default values. The resources include the open file descriptor table (which, when shared, permits processes to open and close files for other processes), and open files. The flags argument is the logical OR of some subset of: RFPROC If set a new process is created; otherwise changes affect the current process. RFNOWAIT If set, the child process will be dissociated from the parent. Upon exit the child will not leave a status for the parent to collect. See wait(2). RFFDG If set, the invoker's file descriptor table (see intro(2)) is copied; otherwise the two processes share a single table. RFCFDG If set, the new process starts with a clean file descriptor table. Is mutually exclusive with RFFDG. RFTHREAD If set, the new process shares file descriptor to process leaders table with its parent. Only applies when neither RFFDG nor RFCFDG are set. RFMEM If set, the kernel will force sharing of the entire address space, typically by sharing the hardware page table directly. The child will thus inherit and share all the segments the parent process owns, whether they are normally shareable or not. The stack segment is not split (both the parent and child return on the same stack) and thus rfork() with the RFMEM flag may not generally be called directly from high level languages including C. May be set only with RFPROC. A helper function is provided to assist with this problem and will cause the new process to run on the provided stack. See rfork_thread(3) for information. RFSIGSHARE If set, the kernel will force sharing the sigacts structure between the child and the parent. RFLINUXTHPN If set, the kernel will return SIGUSR1 instead of SIGCHILD upon thread exit for the child. This is intended to mimic certain Linux clone behaviour. File descriptors in a shared file descriptor table are kept open until either they are explicitly closed or all processes sharing the table exit. If RFPROC is set, the value returned in the parent process is the process id of the child process; the value returned in the child is zero. Without RFPROC, the return value is zero. Process id's range from 1 to the maximum integer (int) value. The rfork() system call will sleep, if necessary, until required process resources are available. The fork() system call can be implemented as a call to rfork(RFFDG | RFPROC) but is not for backwards compatibility. RETURN VALUES
Upon successful completion, rfork() returns a value of 0 to the child process and returns the process ID of the child process to the parent process. Otherwise, a value of -1 is returned to the parent process, no child process is created, and the global variable errno is set to indicate the error. ERRORS
The rfork() system call will fail and no child process will be created if: [EAGAIN] The system-imposed limit on the total number of processes under execution would be exceeded. The limit is given by the sysctl(3) MIB variable KERN_MAXPROC. (The limit is actually ten less than this except for the super user). [EAGAIN] The user is not the super user, and the system-imposed limit on the total number of processes under execution by a single user would be exceeded. The limit is given by the sysctl(3) MIB variable KERN_MAXPROCPERUID. [EAGAIN] The user is not the super user, and the soft resource limit corresponding to the resource argument RLIMIT_NOFILE would be exceeded (see getrlimit(2)). [EINVAL] Both the RFFDG and the RFCFDG flags were specified. [EINVAL] Any flags not listed above were specified. [ENOMEM] There is insufficient swap space for the new process. SEE ALSO
fork(2), intro(2), minherit(2), vfork(2), rfork_thread(3) HISTORY
The rfork() function first appeared in Plan9. BUGS
FreeBSD does not yet implement a native clone() library call, and the current pthreads implementation does not use rfork() with RFMEM. A native port of the linux threads library, /usr/ports/devel/linuxthreads, contains a working clone() call that utilizes RFMEM. The rfork_thread(3) function can often be used instead of clone(). BSD
May 14, 2007 BSD
All times are GMT -4. The time now is 01:48 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy