protect.1 (bd1eafcdd02a6f559844aafe0dd0df34a356259d) protect.1 (cb56f86025b88bc4174aa668b3966886b8420955)
1.\" Copyright (c) 2013 Hudson River Trading LLC
2.\" Written by: John H. Baldwin <jhb@FreeBSD.org>
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 11 unchanged lines hidden (view full) ---

20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $FreeBSD$
27.\"
1.\" Copyright (c) 2013 Hudson River Trading LLC
2.\" Written by: John H. Baldwin <jhb@FreeBSD.org>
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright

--- 11 unchanged lines hidden (view full) ---

20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $FreeBSD$
27.\"
28.Dd April 12, 2022
28.Dd July 7, 2022
29.Dt PROTECT 1
30.Os
31.Sh NAME
32.Nm protect
33.Nd "protect processes from being killed when swap space is exhausted"
34.Sh SYNOPSIS
35.Nm
36.Op Fl i
37.Ar command
38.Nm
39.Op Fl cdi
29.Dt PROTECT 1
30.Os
31.Sh NAME
32.Nm protect
33.Nd "protect processes from being killed when swap space is exhausted"
34.Sh SYNOPSIS
35.Nm
36.Op Fl i
37.Ar command
38.Nm
39.Op Fl cdi
40.Fl g Ar pgrp | Fl p Ar pid
40.Fl g Ar pgrp
41.Nm
42.Op Fl cdi
43.Fl p Ar pid
41.Sh DESCRIPTION
42The
43.Nm
44command is used to mark processes as protected.
45The kernel does not kill protected processes when swap space is exhausted.
46Note that this protected state is not inherited by child processes by default.
47.Pp
48The options are:
44.Sh DESCRIPTION
45The
46.Nm
47command is used to mark processes as protected.
48The kernel does not kill protected processes when swap space is exhausted.
49Note that this protected state is not inherited by child processes by default.
50.Pp
51The options are:
49.Bl -tag -width XXXXXXXXXX
52.Bl -tag -width command
50.It Fl c
51Remove protection from the specified processes.
52.It Fl d
53Apply the operation to all current children of the specified processes.
54.It Fl i
55Apply the operation to all future children of the specified processes.
56.It Fl g Ar pgrp
57Apply the operation to all processes in the specified process group.

--- 61 unchanged lines hidden ---
53.It Fl c
54Remove protection from the specified processes.
55.It Fl d
56Apply the operation to all current children of the specified processes.
57.It Fl i
58Apply the operation to all future children of the specified processes.
59.It Fl g Ar pgrp
60Apply the operation to all processes in the specified process group.

--- 61 unchanged lines hidden ---