Lines Matching +full:resource +full:- +full:files

38 In a normal reboot, the system checks the disks and comes up multi-user
42 This will leave the system in single-user mode, with only the console
46 you must enter the root password to bring the machine to single-user mode.)
48 and then to return to single-user mode by signaling
52 To bring the system up to a multi-user configuration from the single-user
57 a multi-user restart script (and
68 ``fsck \-p'' or force a reboot with
79 when you are running multi-user.
82 system is taken single-user. If you wish to come up multi-user again, you
86 \fB#\fP \fI/sbin/umount -a\fP
117 (e.g. with the command \fItail \-r /var/log/messages\fP).
135 You should arrange to do a towers-of-hanoi dump sequence; we tune
136 ours so that almost all files are dumped on two tapes and kept for at
148 so that dump can notify logged-in operators when it needs help.
188 Dumping of files by name is best done by
195 using the raw special files and an appropriate
208 Exhaustion of user-file space is certain to occur
234 program uses an ``in-place'' algorithm that
286 out at 20-30 tps in practice), and the user cpu utilization (us) should
292 be non-zero). It is healthy for the paging demon to free pages when
301 is overloaded or imbalanced. If you have several non-dma
303 that are doing high-speed non-buffered input/output, then the system
304 time may go high (60-70% or higher).
307 activity (in) and per-device interrupt counts,
309 our large machines we average about 60-200 context switches and interrupts
310 per second and about 50-500 system calls per second.
317 If you expect to be in a memory-poor environment
326 In general, there are six well-known targets supported by
332 This target \fBdoes not\fP build the dependency files.
349 Remove the kernel, binary or library, as well as any object files
352 The same as clean, except that the dependency files and formatted
359 Once this shadow structure has been created, all the files created by
363 may be mounted read-only by multiple machines.
391 If you want to mount your source tree read-only,
423 Note, if system include files have changed between compiles,
426 files have not been built using the ``depend'' target.
435 This target installs the system include files, cleans the source
473 If you modify the C library or system include files, to change a
476 You must ensure that the include files are installed before anything
480 If include files have been modified, the following commands should
486 Then, if, for example, C library files have been modified, the
520 /usr/local/man/cat[1-8] to encourage this practice (see
525 connect time accounting and process resource accounting. The connect
547 .Sh 2 "Resource control"
549 Resource control in the current version of UNIX is more
553 number of files and amount of disk space each user and/or group may use
587 When a user and/or group first reaches a soft limit on a resource, a
589 lower the resource usage below the soft limit
610 In particular, look at the \fB\-i\fP and \fB\-s\fP options in the manual page.
622 accept a \fB\-d\fP option forcing
625 .Sh 2 "Files that need periodic attention"
628 the files that require periodic attention or are system specific: