2 .\" Copyright (c) 2009 Edward Tomasz Napierala
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
13 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR THE VOICES IN HIS HEAD BE
17 .\" LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
18 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
19 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
20 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
21 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
22 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
23 .\" POSSIBILITY OF SUCH DAMAGE.
30 .Nd display and update resource limits database
52 When called without options, the
54 command writes currently defined RCTL rules to standard output.
58 argument is specified, only rules matching the filter are displayed.
59 The options are as follows:
60 .Bl -tag -width indent
66 Display rules applicable to the process defined by
68 Note that this is different from showing the rules when called without
69 any options, as it shows not just the rules with subject equal to that
70 of process, but also rules for the user, jail, and login class applicable
75 from the RCTL database.
77 Display resource utilization for a subject
88 "Human-readable" output.
89 Use unit suffixes: Byte, Kilobyte, Megabyte,
90 Gigabyte, Terabyte and Petabyte.
92 Display user IDs numerically rather than converting them to a user name.
95 Modifying rules affects all currently running and future processes matching
98 Syntax for a rule is subject:subject-id:resource:action=amount/per.
100 .Bl -tag -width "subject-id" -compact -offset indent
102 defines the kind of entity the rule applies to.
112 It can be a process ID, user name, numerical user ID, login class name from
116 identifies the resource the rule controls.
119 section below for details.
121 defines what will happen when a process exceeds the allowed
125 section below for details.
127 defines how much of the resource a process can use before
131 Resources which limit bytes may use prefixes from
132 .Xr expand_number 3 .
134 defines what entity the
137 For example, rule "loginclass:users:vmemoryuse:deny=100M/process" means
138 that each process of any user belonging to login class "users" may allocate
139 up to 100MB of virtual memory.
140 Rule "loginclass:users:vmemoryuse:deny=100M/user" would mean that for each
141 user belonging to the login class "users", the sum of virtual memory allocated
142 by all the processes of that user will not exceed 100MB.
143 Rule "loginclass:users:vmemoryuse:deny=100M/loginclass" would mean that the sum of
144 virtual memory allocated by all processes of all users belonging to that login
145 class will not exceed 100MB.
148 A valid rule has all those fields specified, except for
154 A filter is a rule for which one of more fields other than
157 For example, a filter that matches every rule could be written as ":::=/",
159 A filter that matches all the login classes would be "loginclass:".
160 A filter that matches all defined rules for
165 .Bl -column -offset 3n "pseudoterminals" ".Sy username or numerical User ID"
166 .It Sy process Ta numerical Process ID
167 .It Sy user Ta user name or numerical User ID
168 .It Sy loginclass Ta login class from
170 .It Sy jail Ta jail name
173 .Bl -column -offset 3n "pseudoterminals"
174 .It Sy cputime Ta "CPU time, in seconds"
175 .It Sy datasize Ta "data size, in bytes"
176 .It Sy stacksize Ta "stack size, in bytes"
177 .It Sy coredumpsize Ta "core dump size, in bytes"
178 .It Sy memoryuse Ta "resident set size, in bytes"
179 .It Sy memorylocked Ta "locked memory, in bytes"
180 .It Sy maxproc Ta "number of processes"
181 .It Sy openfiles Ta "file descriptor table size"
182 .It Sy vmemoryuse Ta "address space limit, in bytes"
183 .It Sy pseudoterminals Ta "number of PTYs"
184 .It Sy swapuse Ta "swap space that may be reserved or used, in bytes"
185 .It Sy nthr Ta "number of threads"
186 .It Sy msgqqueued Ta "number of queued SysV messages"
187 .It Sy msgqsize Ta "SysV message queue size, in bytes"
188 .It Sy nmsgq Ta "number of SysV message queues"
189 .It Sy nsem Ta "number of SysV semaphores"
190 .It Sy nsemop Ta "number of SysV semaphores modified in a single semop(2) call"
191 .It Sy nshm Ta "number of SysV shared memory segments"
192 .It Sy shmsize Ta "SysV shared memory size, in bytes"
193 .It Sy wallclock Ta "wallclock time, in seconds"
194 .It Sy pcpu Ta "%CPU, in percents of a single CPU core"
195 .It Sy readbps Ta "filesystem reads, in bytes per second"
196 .It Sy writebps Ta "filesystem writes, in bytes per second"
197 .It Sy readiops Ta "filesystem reads, in operations per second"
198 .It Sy writeiops Ta "filesystem writes, in operations per second"
201 .Bl -column -offset 3n "pseudoterminals"
202 .It Sy deny Ta deny the allocation; not supported for
210 .It Sy log Ta "log a warning to the console"
211 .It Sy devctl Ta "send notification to"
222 send a signal to the offending process.
225 for a list of supported signals
226 .It Sy throttle Ta "slow down process execution"; only supported for
234 Not all actions are supported for all resources.
235 Attempting to add a rule with an action not supported by a given resource will
240 Prevent user "joe" from allocating more than 1GB of virtual memory:
241 .Dl Nm Fl a Ar user:joe:vmemoryuse:deny=1g
243 Remove all RCTL rules:
246 Display resource utilization information for jail named "www":
247 .Dl Nm Fl hu Ar jail:www
249 Display all the rules applicable to process with PID 512:
250 .Dl Nm Fl l Ar process:512
255 Display all rules matching user "joe":
258 Display all rules matching login classes:
259 .Dl Nm Ar loginclass:
274 .An Edward Tomasz Napierala Aq Mt trasz@FreeBSD.org
275 under sponsorship from the FreeBSD Foundation.
279 may kill the machine due to thrashing.
285 counters are only approximations.
290 they are calculated in the filesystem layer, where it is difficult
291 or even impossible to observe actual disk device operations.
297 resources generally account for writes to the filesystem cache,
298 not to actual devices.