1 .\" $NetBSD: getrlimit.2,v 1.32 2009/07/01 11:25:50 wiz Exp $
3 .\" Copyright (c) 1980, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" @(#)getrlimit.2 8.1 (Berkeley) 6/4/93
38 .Nd control maximum system resource consumption
44 .Fn getrlimit "int resource" "struct rlimit *rlp"
46 .Fn setrlimit "int resource" "const struct rlimit *rlp"
48 Limits on the consumption of system resources by the current process
49 and each process it creates may be obtained with the
51 call, and set with the
54 Resources of an arbitrary process can be obtained/changed using
59 parameter is one of the following:
60 .Bl -tag -width RLIMIT_FSIZEAA
62 The maximum amount (in bytes) of virtual memory the process is allowed to map.
64 The largest size (in bytes)
66 file that may be created.
68 The maximum amount of CPU time (in seconds) to be used by
71 The maximum size (in bytes) of the data segment for a process;
72 this defines how far a program may extend its break with the
76 The largest size (in bytes) file that may be created.
78 The maximum size (in bytes) which a process may lock into memory
83 The maximum number of open files for this process.
85 The maximum number of simultaneous processes for this user id.
87 The maximum size (in bytes) to which a process's resident set size may
89 This imposes a limit on the amount of physical memory to be given to
90 a process; if memory is tight, the system will prefer to take memory
91 from processes that are exceeding their declared resident set size.
93 The maximum size (in bytes) of the socket buffers
101 The maximum size (in bytes) of the stack segment for a process;
102 this defines how far a program's stack segment may be extended.
103 Stack extension is performed automatically by the system.
106 A resource limit is specified as a soft limit and a hard limit.
107 When a soft limit is exceeded a process may receive a signal (for example,
108 if the CPU time or file size is exceeded), but it will be allowed to
109 continue execution until it reaches the hard limit (or modifies
113 structure is used to specify the hard and soft limits on a resource,
114 .Bd -literal -offset indent
116 rlim_t rlim_cur; /* current (soft) limit */
117 rlim_t rlim_max; /* hard limit */
121 Only the super-user may raise the maximum limits.
122 Other users may only alter
124 within the range from 0 to
126 or (irreversibly) lower
131 value for a limit is defined as
134 Because this information is stored in the per-process information,
135 this system call must be executed directly by the shell if it
136 is to affect all future processes created by the shell.
137 Thus, shells provide built-in commands to change the limits
146 The system refuses to extend the data or stack space when the limits
147 would be exceeded in the normal way: a
149 call fails if the data space limit is reached.
150 When the stack limit is reached, the process receives
153 if this signal is not
154 caught by a handler using the signal stack, this signal
155 will kill the process.
157 A file I/O operation that would create a file larger that the process'
158 soft limit will cause the write to fail and a signal
161 generated; this normally terminates the process, but may be caught.
162 When the soft CPU time limit is exceeded, a signal
167 A 0 return value indicates that the call succeeded, changing
168 or returning the resource limit.
169 Otherwise, \-1 is returned and the global variable
171 is set to indicate the error.
180 The address specified for
192 exceeds the specified
195 The limit specified to
198 raised the maximum limit value, and the caller is not the super-user.
203 function may fail if:
206 The limit specified to
208 cannot be lowered, because current usage is already higher than the limit.
220 .\" With exception of
222 .\" (which is not currently supported), the
226 .\" functions conform to
231 function call appeared in