|
privileges(5) -- description of privileged user
|
The UNIX(R) operating system has traditionally used an "all or nothing" privilege model, where superusers (those with effective UID 0, such as the root user) have virtually unlimited power, and other users have few or no special privileges. System administrators often need to delegate limited powers to other users. HP-UX provides several ways to do this, including restricted sam(1M), the privile... |
pthread_scope_options(5) -- list of external options to specify the scheduling contention scope of threads
|
From HP-UX release 11i version 2 and forward, HP-UX supports the "MxN" thread model. With MxN model, application has the flexibility of selecting the type of thread (determined by the contention scope specified) in the application. Based on the contention scope, there are two types of threads, PTHREAD_SCOPE_SYSTEM threads and PTHREAD_SCOPE_PROCESS threads. pthread_attr_init() can be used to init... |
|
pthread_stubs(5) -- list of pthread calls for which the stubs are provided in the C library
|
The libc shared libraries in libc cumulative patches, PHCO_22923 (11.00) and PHCO_23772 (11.11) onwards, contain stubs for the pthread functions in libpthread and libcma. The stubs allow non-threaded applications to dynamically load thread-safe libraries successfully, so that the pthread symbols are resolved. Applications that resolve pthread/cma calls to the stub must be built without -lpthread o... |
quota(5) -- disk quotas
|
Disk quotas can be used by the system administrator to limit the number of files and file blocks owned by a user on a per-file-system basis. Separate limits can be established for both the number of files (inodes) and the number of 1-Kbyte blocks for each user. A soft (preferred) and a hard limit are established. For example, user joe_doe may have soft limits of 1000 blocks and 200 files and hard ... |
rcsintro(5) -- description of RCS commands
|
Revision Control System (RCS) automates the storing, retrieval, logging, identification, and merging of revisions of ASCII text files. RCS is useful for managing files that are revised frequently. |
regexp(5) -- regular expression and pattern matching notation definitions
|
A Regular Expression is a mechanism supported by many utilities for locating and manipulating patterns in text. Pattern Matching Notation is used by shells and other utilities for file name expansion. This manual entry defines two forms of regular expressions: Basic Regular Expressions and Extended Regular Expressions; and the one form of Pattern Matching Notation. |
region_hash_locks(5) -- determines the size of the region spinlock pool
|
Global kernel structures containing information on a running process or memory usage are frequently accessed or modified by several threads concurrently. To prevent race conditions, these structures are protected by spinlocks (kernel data structures used for synchronization) which allow only the spinlock 'holder' to proceed, while all others attempting to access the structure must wait. Hashed s... |
remote_nfs_swap(5) -- enable swapping across NFS
|
This tunable controls adding a NFS filesystem for use as swap. If remote_nfs_swap is set to 0 (off), only local filesystems and devices can be used for swap. If it is set to 1 (on), both local and networked file systems can be used for swap. Historically, this tunable was used in NFS clusters that are no longer supported, but this capability has not yet been removed. Who Is Expected to Change This... |
rtsched_numpri(5) -- number of priority values to support for POSIX.1b realtime applications
|
The rtsched_numpri tunable defines how many priority values to support for POSIX 1.b realtime applications. A larger value provides additional flexibility to applications in managing relative priorities of all threads with respect to each other and with respect to other applications running in the system. However, a larger value adds processing overhead in the operating system in terms of managing... |
scroll_lines(5) -- number of scrollable lines used by the Internal Terminal Emulator
|
This tunable specifies the total number of scroll buffer lines used by the HP-UX graphics console Internal Terminal Emulator (ITE). This value is the sum of both on-screen and off-screen lines. For instance, if the ITE has 68 on-screen lines, and the value of scroll_lines is 128, then there will be 60 off-screen lines that can be scrolled back into view. During boot, the system may adjust the valu... |
scsi_maxphys(5) -- maximum allowed length of an I/O on all SCSI devices
|
This tunable sets the maximum data size the SCSI subsystem will accept for an I/O. Depending on the device's characteristics and the device driver configuration, the maximum size allowed by the SCSI subsystem for a particular SCSI device might be lower than or equal to this tunable's value. It will never be greater. Who Is Expected to Change This Tunable? Any customer. |
scsi_max_qdepth(5) -- maximum number of I/Os that target will queue up for execution
|
Some SCSI devices support tagged queuing, which means that they can have more than one SCSI command outstanding at any point in time. The number of commands that can be outstanding varies by device, and is not known to HP-UX. To avoid overflowing this queue, HP-UX will not send more than a certain number of outstanding commands to any SCSI device. This tunable sets the default value for that limit... |
sd(5) -- Software Distributor, commands to create, distribute, install, monitor, and manage software
|
See the Software Distributor Administration Guide, available at http://docs.hp.com for a complete description of SD. The SD command and related programs: + sd - Lets you interactively create, schedule, and monitors software jobs and log files. Also lets you launch the install, copy, and remove commands. + swacl - Modifies Access Control Lists (ACLs), which control SD security. + swagentd - Daemon ... |
secure_sid_scripts(5) -- controls whether setuid and setgid bits on scripts are honored
|
This tunable controls whether setuid and setgid bits on executable scripts have any effect. Honoring set*id on scripts make a system vulnerable to attack by malicious users. The default value for this variable is 1, indicating that set*id bits are to be ignored by the execve(2) system call for higher security. The tunable can be set to 0 for a compatibility with older releases at the expense of se... |
sec_audit_events(5) -- Auditable events for the security services
|
Code is in place for auditing security-significant events in the Security Server. Among these events are + Attempts at invoking Authentication Server/Ticket-granting Server/Privilege Server (AS/TGS/PS) operations. + Deletion of Security Server objects, including -- ACLs -- accounts -- pgo items -- registry properties -- registry/organization policies -- registry master key + Attempts at invoking a... |