From patchwork Mon May 15 22:47:24 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bart Van Assche X-Patchwork-Id: 9728161 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id EA41460387 for ; Mon, 15 May 2017 22:47:54 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D58FB28464 for ; Mon, 15 May 2017 22:47:54 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id CA06B288B0; Mon, 15 May 2017 22:47:54 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id EBC8E28464 for ; Mon, 15 May 2017 22:47:53 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752346AbdEOWrv (ORCPT ); Mon, 15 May 2017 18:47:51 -0400 Received: from esa3.hgst.iphmx.com ([216.71.153.141]:60329 "EHLO esa3.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752326AbdEOWrr (ORCPT ); Mon, 15 May 2017 18:47:47 -0400 X-IronPort-AV: E=Sophos;i="5.38,346,1491235200"; d="scan'208,223";a="17886594" Received: from mail-sn1nam02lp0022.outbound.protection.outlook.com (HELO NAM02-SN1-obe.outbound.protection.outlook.com) ([216.32.180.22]) by ob1.hgst.iphmx.com with ESMTP; 16 May 2017 06:47:44 +0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector1-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=0y+FjRyAe8/EO5K7uK55n+v+mqCfs9d/VbS0JJaLU6o=; b=iWKfAr+GA6gDyVNXj6+VsvPvFZ6uN5gQut/FiNZxIwc2o+hrNrFlEkTMwCLiiAfkQ1jvBhx0S1dLHTVKAbe1pVQoQ50QedY1nfF1OX5G2umwPqO8honLpuYERbcxYciJ3DE+Lb3IY0iJSjJimy1GlGh1tYdckrB7oYT7N60wnAA= Received: from CO2PR04CA016.namprd04.prod.outlook.com (10.141.240.144) by CO2PR04MB713.namprd04.prod.outlook.com (10.141.229.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16; Mon, 15 May 2017 22:47:42 +0000 Received: from CO1NAM04FT040.eop-NAM04.prod.protection.outlook.com (2a01:111:f400:7e4d::205) by CO2PR04CA016.outlook.office365.com (2a01:111:e400:1428::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16 via Frontend Transport; Mon, 15 May 2017 22:47:42 +0000 Authentication-Results: spf=pass (sender IP is 63.163.107.225) smtp.mailfrom=sandisk.com; mellanox.com; dkim=none (message not signed) header.d=none;mellanox.com; dmarc=bestguesspass action=none header.from=sandisk.com; Received-SPF: Pass (protection.outlook.com: domain of sandisk.com designates 63.163.107.225 as permitted sender) receiver=protection.outlook.com; client-ip=63.163.107.225; helo=milsmgep14.sandisk.com; Received: from milsmgep14.sandisk.com (63.163.107.225) by CO1NAM04FT040.mail.protection.outlook.com (10.152.91.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.1075.5 via Frontend Transport; Mon, 15 May 2017 22:47:41 +0000 Received: from MILHUBIP03.sdcorp.global.sandisk.com (Unknown_Domain [10.201.67.162]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by (Symantec Messaging Gateway) with SMTP id 29.32.19026.C003A195; Mon, 15 May 2017 15:47:40 -0700 (PDT) Received: from milsmgip11.sandisk.com (10.177.8.100) by MILHUBIP03.sdcorp.global.sandisk.com (10.177.9.96) with Microsoft SMTP Server id 14.3.319.2; Mon, 15 May 2017 15:47:36 -0700 X-AuditID: 0ac94371-41ba798000004a52-04-591a300cdd05 Received: from exp-402881.sdcorp.global.sandisk.com ( [10.177.8.100]) by (Symantec Messaging Gateway) with SMTP id B2.E3.11415.8003A195; Mon, 15 May 2017 15:47:36 -0700 (PDT) From: Bart Van Assche To: Doug Ledford CC: , Jason Gunthorpe , Leon Romanovsky , Bart Van Assche Subject: [PATCH rdma-core 2/5] srp_daemon: Use the recommended style in the man page Date: Mon, 15 May 2017 15:47:24 -0700 Message-ID: <20170515224733.29586-3-bart.vanassche@sandisk.com> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20170515224733.29586-1-bart.vanassche@sandisk.com> References: <20170515224733.29586-1-bart.vanassche@sandisk.com> X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrGLMWRmVeSWpSXmKPExsXCddJ5kS6PgVSkwclrBhYvz39gtfh+w9Ti ZN8/Zotnh3pZHFg8nk0/zOTxfUcvo8f7fVfZPD5vkgtgieKySUnNySxLLdK3S+DKOP7gLFNB n1XFucmnmBsYuwy6GDk5JARMJA7tX8jSxcjFISSwlEli36H3jBDODkaJzknn2WCq5p2fzASR 2Mwo8fHQXXaQBJuAkcS39zNZQGwRATWJTa8WsYMUMQusYZT4seUXWJGwQIjEvKdLmEBsFgFV iXnL3oJN5RWwl9jwcjUrxAZ5ibNbdjKD2JwCDhJ/bz4FqucA2mYv8fO0GshMCYE2VokFs3az QPQKSpyc+QTMZhaQkDj44gVYr5CAusTJJfOZJjAKzUJSNgtJ2QJGplWMYrmZOcW56akFhiZ6 xYl5KZnF2XrJ+bmbGCGhXbiD8fVt70OMAhyMSjy8K1ZIRgqxJpYVV+YeYpTgYFYS4eXglooU 4k1JrKxKLcqPLyrNSS0+xCjNwaIkzpslOzVCSCA9sSQ1OzW1ILUIJsvEwSnVwGh/eqX9p8ic j9lhrTuPrp9aWXbng2uKOXN6QOTHu6ybopbL/7H8sDX5Qb7Ew+KExBk2b29cf1wgJ372uere 6NvV38u11Z7HSjk8efetJWPz1kmdykW3p+Y85uotX/hjs/HR/Uwpk+MqWw/5Pijb4cDQFHSg 5+01sYjrK+zfTDp+WrRhx7Js+0wlluKMREMt5qLiRABvs+daaQIAAA== X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrCJMWRmVeSWpSXmKPExsXCtZEjRZfDQCrS4PMbI4uDP9sYLV6e/8Bq 8f2GqcXJvn/MFs8O9bI4sHo8m36YyeP7jl5Gj/f7rrJ5TFtznsnj8ya5ANYoLpuU1JzMstQi fbsErozjD84yFfRZVZybfIq5gbHLoIuRk0NCwERi3vnJTF2MXBxCAhsZJWYev80IkmATMJL4 9n4mC4gtIqAmsenVInYQm1lgDaPExr1gcWGBEIl5T5cwgdgsAqoS85a9ZQOxeQXsJc48fcAM sUBe4uyWnWA2p4CDxN+bT4HqOYCW2Uv8PK02gZF7ASPDKkax3Myc4tz0zAJDQ73ixLyUzOJs veT83E2M4HDgjNzB+HSi+SFGJg5OqQbGxKsnHNav/HX8b/Dm+ltRZtl3/549slJ7n0OE4YTQ c1o/zx/qXrX46gLzTNNjnG+u37D46b7jErPGnEk+XyueBXd6Tfh2Tfmmiu4Rlofznao8f7JV qW/oYI9w3hp92/bhtZAFtc8339vWLTkp8Mld7bd+q99x+HPs7/N+cYVZ8htLTtdd/qCpE5RY ijMSDbWYi4oTAcmGtF23AQAA MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:63.163.107.225; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39840400002)(39400400002)(39860400002)(39850400002)(39410400002)(2980300002)(438002)(199003)(189002)(9170700003)(76176999)(356003)(50986999)(2906002)(33646002)(1076002)(50226002)(86362001)(77096006)(47776003)(5003940100001)(478600001)(53936002)(81166006)(189998001)(50466002)(305945005)(72206003)(107886003)(110136004)(38730400002)(106466001)(5660300001)(6916009)(4326008)(2950100002)(6666003)(8676002)(54906002)(8936002)(36756003)(6306002)(966005); DIR:OUT; SFP:1102; SCL:1; SRVR:CO2PR04MB713; H:milsmgep14.sandisk.com; FPR:; SPF:Pass; MLV:sfv; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; CO1NAM04FT040; 1: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 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 52fb51ab-0019-4557-1a04-08d49be46520 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(8251501002)(2017030254075)(201703131423075)(201703031133081)(201702281549075); SRVR:CO2PR04MB713; X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 3: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 X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 25:BUWZch0xA+/h+YeJCE6PjSMqDO9Qm69ogNX+vIHok02qCtJTU4sNeI+rdKpoyK673RGK8jo6Tkj3kLGUjgdAfQxnNb93RQjS/UuhovoGUZX5WEO39Bp5brXew396twS+LBe498jYB8duxyiuClwbijJJGhn191o5HUduomNUvPYTxOlj4BmJDLQL+CgnPQkRhwphTCRBNVbXpueg2DUA0JLD0O8ihNEQh60iLZKwEaDp8Oeq5LHfejqi/vJBk3WLVO35HR6ZGrj+ZNlo8VZrf/kZFtzcqx8/gqx0Do46XxXFu+P2gK0yJ1KThcdlgPMa4cvtVGdxvKVkTXJsSSXeKWyPghq3PytUQqIEtO7DS0fek5+ra6y67EoURHkCqVwjhm83PP8N66BnTtOybg5/UyW4N0TWx8GCuvYzpmSH2SV5rZgw2+tcm5m0YjZett9ZTtYdp9C7vJyuZbaH39wA9s3ZW9Ih9pDJ0nks0nG77fg=; 31:6eFRZITenxKVD2ZhQnCTetF8X8FoyWOoPNV2ACsIjl2rrJkpmt4pt5XiohGq5Xzmyn1vY80QQi/IaeYpPongTusdS6W/U0IeESHKN8GFgD6NiI9pWjZESL5Zy8Vy9VV9LZAdIaq92sEP/N5syaRkg1AF5dVSadCSfLtuBZNpyJZs5lTXT0z+eIfG7L2Pn+5z61IRR4ACEUTmMWIyyXlN2+zngkERkbokqK+jJfrxfOGOiynwGmN7jae3iiVTbZQHdfZr0Gd3Ke4qqvvCmEb5hw== WDCIPOUTBOUND: EOP-TRUE X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(21532816269658)(42932892334569); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(13016025)(5005006)(13018025)(8121501046)(3002001)(10201501046)(93006095)(93004095)(6055026)(6041248)(20161123558100)(20161123555025)(20161123564025)(20161123560025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148); SRVR:CO2PR04MB713; BCL:0; PCL:0; RULEID:; SRVR:CO2PR04MB713; X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 4: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 = X-Forefront-PRVS: 0308EE423E X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR04MB713; 23:3jNeK8XWK2rAs3LqekFyDOe53aDIODXnriv/xHI3/5?= =?us-ascii?Q?sG1ycnJzNp344z0hId5Ngb4FTqbloy9u5AgPrYhZJ/A4Hr2FXDH6XC/UhKcU?= =?us-ascii?Q?Mg2P+ggRcmAVJgdv5DVyP+Zc0V7JiU9cmVqqmUEosWF2/mHWsz7VSIT3WdS9?= =?us-ascii?Q?wQD8ALX2FvTU12orJTyPODN+DMaEN81TlS5KkXrmWkKSV2dpD91MzKHW7PxK?= =?us-ascii?Q?bVGxvMlD014JEE/OgXmZtebtjgBEaVT1gcrVrptrnxDi5MXtC6MzNk6k8+jy?= =?us-ascii?Q?fA49qSGy+ecqwUgcQyGUClIK/Aii4eR95n0rVUYFOpmDZoO3la2t7RrjTLI0?= =?us-ascii?Q?wk2citYAUb6PPa7ZpB0vQ2ot3T9+k4n8KCeYKoLX85zktIfwc0WnD/8mlGd5?= =?us-ascii?Q?FUVa+1mrjepXSGu+gE7aP6iyFBvnUfoUlmFVyItajVn16YtKKGFdFtE751P+?= =?us-ascii?Q?9x3EdSY/1pNF3mIx28RwGjEZuHQGkmCvbyiYdzDCkfQov8kAYDUyWTqDVucG?= =?us-ascii?Q?eJTbq1EodcHD4R0NSdS3jpQ9HOYh9IMr3Psla+EHgejfC789We/g+CgzuPm7?= =?us-ascii?Q?RqiNQWH/ibJn1IXPYA70i0U079OhUMrVKL/zxswO3r6KknFjxXxomS9xeDUY?= =?us-ascii?Q?HAqOlDssz92RTZ2mUOPY2mqIP681MKc9kvYmIZFh1TP5nBZdOkCU9z0p1cWK?= =?us-ascii?Q?pNn7atQKjoF6nMUyOhk+fVJT19ft952CdZwQe3x7N4wP+cwvzTmkSNKo/sX9?= =?us-ascii?Q?TwBFP94QkAOvcrrEmOqNEPt5W7QeCiiaqZ9htYpeDqRbeumwfkbFHG1b6fsl?= =?us-ascii?Q?/m83lTAoGNRLmcHuOAh033NCdxOZKZ0rztsh7UDSxquEvZvGgG90rQq/EOvN?= =?us-ascii?Q?9u+Jvw36m73fvC+qieJPFcLWGs12vn4V/pKxV9F1lRYlPXtP2n0MRWYlQd5q?= =?us-ascii?Q?FX72+J2zEbIkU0wElj5a9tDy8XBaD11EDaNIMuaC+/JhUA+IobvByGZrHx97?= =?us-ascii?Q?dq/POhuhUtZ3spDMvZEHeeLLQc5E7hdCESUCrw8vU4Xf2a21mneQbSAKwEX4?= =?us-ascii?Q?GoFD3lSzotufULHJxqbfiCzKTRwaquD3qCw3MYScc5z1FOcZSBPBbyEtiqm2?= =?us-ascii?Q?2LLR5/jJA=3D?= X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 6: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; 5:lY64Ahoa5Iry+ydq4gAK8uo/0tHDf9U00HMBGkv74/P/rZpABznC0Tl0FXMcDerKRFq0ABJn68+sdy3bDGen7Trjh9BaEHGlZG4OJGKSjsemKNqgbCiW6hjvO5Mc0DU3Sb5aGk7Hr6tKfM8qgscfiQ==; 24:qlLh4iq1cCU8cO3h7g38K/BiOh/pUATqTFRlWgUIa3RClKijJB1GYnzZEcOK4IZc+lkviAXfZX50hpcm+odipI2YhgiuNRGttez3dyiXFLU= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB713; 7:UAv7S5v+TeKYErMr2EG8j7LVqR4cikruLSrUIdkh+fR8mzdzekIz5fXy3TlsfZ2eyGb5qx8QnB7vmvMMNJcaMS3pfa4Xd+UMdnrO5DqmAV8UPbzrLlyDS89jwr8SJj2MYYzDI6naNXPtCxHKq0W9gF617Ie/snZluIbC6zCOz8sWDXEopsthlfJpt0OUh+6ap+atCvltugjHUMa8fH+1jNRzxBq0t5jbWaTKTrvGYOnrNCGds6wCZwa5StpJtQkEk4Ha4rILwv5QN7LH8yUsdrd/+bdVSTvTW4XofoJIy37yalO8nRngAif9TJ6xhaHfpgKEjbz3g+Wp2NmSiR/Dfg==; 20:H8p7ljM5bmYSeyMKVJe33k7ACzDHYCtXPO08Bxi5FXoQFBdb9xRkgLhxmB0XB8jRG2wgAGRfvdG5hLsGguRs4EtzfldbKGpYs6KFCdJcMLsiMHjcNe6+MWpUtEDKbEd2VrhkD75yErwaSFPt6OvI2zMWIdlDniRvpFXDLZ6k1PQ= X-OriginatorOrg: sandisk.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 May 2017 22:47:41.4721 (UTC) X-MS-Exchange-CrossTenant-Id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=b61c8803-16f3-4c35-9b17-6f65f441df86; Ip=[63.163.107.225]; Helo=[milsmgep14.sandisk.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR04MB713 Sender: linux-rdma-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From https://liw.fi/manpages/, about the SYNOPSIS section: Font usage is important here, and carries information. All the parts that are in bold are things that the user is expected to write verbatim. Italic indicates values the user is expected to fill in. Normal font is used for syntax meta-characters: for the brackets that indicate optionality, and the ellipsis that indicates repetition. Additionally, change the identifiers that refer to arguments to lower case. Signed-off-by: Bart Van Assche --- srp_daemon/srp_daemon.1.in | 41 +++++++++++++++++++++++++++-------------- 1 file changed, 27 insertions(+), 14 deletions(-) diff --git a/srp_daemon/srp_daemon.1.in b/srp_daemon/srp_daemon.1.in index 008d53a2..02e1f2df 100644 --- a/srp_daemon/srp_daemon.1.in +++ b/srp_daemon/srp_daemon.1.in @@ -5,18 +5,30 @@ srp_daemon \- Discovers SRP targets in an InfiniBand Fabric .SH SYNOPSIS -.B srp_daemon [-vVcaeon] [-d \fIumad-device\fR | -i \fIinfiniband-device\fR [-p \fIport-num\fR]] [-t \fItimeout(ms)\fR] [-r \fIretries\fR] [-R \fIRescan-time\fR] [-f \fIrules-File\fR] +.B srp_daemon\fR [\fB-vVcaeon\fR] [\fB-d \fIumad-device\fR | \fB-i \fIinfiniband-device\fR [\fB-p \fIport-num\fR]] [\fB-t \fItimeout(ms)\fR] [\fB-r \fIretries\fR] [\fB-R \fIrescan-time\fR] [\fB-f \fIrules-file\fR] .SH DESCRIPTION .PP Discovers and connects to InfiniBand SCSI RDMA Protocol (SRP) targets in an IB fabric. -Each srp_daemon instance operates on one local port. Upon boot it performs a full rescan of the fabric then waits for an srp_daemon event. An srp_daemon event can be a join of a new machine to the fabric, a change in the capabilities of a machine, an SA change, or an expiration of a predefined timeout. +Each srp_daemon instance operates on one local port. Upon boot it performs a +full rescan of the fabric and then waits for an srp_daemon event. An +srp_daemon event can be a join of a new machine to the fabric, a change in the +capabilities of a machine, an SA change, or an expiration of a predefined +timeout. -When a new machine joins the fabric, srp_daemon checks if it is a target. When there is a change of capabilities, srp_daemon checks if the machine has turned into a target. When there is an SA change or a timeout expiration, srp_daemon performs a full rescan of the fabric. +When a new machine joins the fabric, srp_daemon checks if it is an SRP +target. When there is a change of capabilities, srp_daemon checks if the +machine has turned into an SRP target. When there is an SA change or a timeout +expiration, srp_daemon performs a full rescan of the fabric. -For each target srp_daemon finds, it checks if it should connect to this target according to its rules (default rules file is @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf) and if it is already connected to the local port. If it should connect to this target and if it is not connected yet, srp_daemon can either print the target details or connect to it. +For each target srp_daemon finds, it checks if it should connect to this +target according to its rules (the default rules file is +@CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf) and if it is already +connected to the local port. If it should connect to this target and if it is +not connected yet, srp_daemon can either print the target details or connect +to it. .SH OPTIONS @@ -42,24 +54,25 @@ Generate output suitable for piping directly to a /sys/class/infiniband_srp/srp\-\-/add_target file. .TP \fB\-a\fR -Prints all the targets in the fabric, not only targets that are not connected through the local port. (The same as ibsrpdm.) +Prints all the targets in the fabric, not only targets that are not connected +through the local port. This is the same behavior as that of ibsrpdm. .TP \fB\-e\fR Execute the connection command, i.e., make the connection to the target. .TP \fB\-o\fR -Perform only one rescan and exit. (The same as ibsrpdm.) +Perform only one rescan and exit just like ibsrpdm. .TP -\fB\-R\fR \fIRescan-time\fR -Force a complete rescan every \fIRescan-time\fR seconds. If -R is not specified, no timeout rescans will be performed. +\fB\-R\fR \fIrescan-time\fR +Force a complete rescan every \fIrescan-time\fR seconds. If -R is not specified, no timeout rescans will be performed. .TP -\fB\-T\fR \fIretry-Timeout\fR -Retries to connect to existing target after \fIretry-Timeout\fR seconds. If -R is not specified, uses 5 Seconds timeout. if retry-Timeout is 0, will not try to reconnect. The reason srp_daemon retries to connect to the target is because there may be a rare scnerio in which srp_daemon will try to connect to add a target when the target is about to be removed, but is not removed yet. +\fB\-T\fR \fIretry-timeout\fR +Retries to connect to existing target after \fIretry-timeout\fR seconds. If -R is not specified, uses 5 Seconds timeout. if retry-timeout is 0, will not try to reconnect. The reason srp_daemon retries to connect to the target is because there may be a rare scnerio in which srp_daemon will try to connect to add a target when the target is about to be removed, but is not removed yet. .TP -\fB\-f\fR \fIrules-File\fR -Decide to which targets to connect according to the rules in \fIrules-File\fR. +\fB\-f\fR \fIrules-file\fR +Decide to which targets to connect according to the rules in \fIrules-file\fR. If \fB\-f\fR is not specified, uses the default rules file @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf. -Each line in the \fIrules-File\fR is a rule which can be either an allow connection or a disallow connection according to +Each line in the \fIrules-file\fR is a rule which can be either an allow connection or a disallow connection according to the first character in the line (a or d accordingly). The rest of the line is values for id_ext, ioc_guid, dgid, service_id. Please take a look at the example section for an example of the file. srp_daemon decide whether to allow or disallow each target according to first rule that match the target. If no rule matches the target, the target is allowed and will be connected. In an allow rule it is possible to set attributes for the connection to the target. Supported attributes are max_cmd_per_lun and max_sect. .TP @@ -74,7 +87,7 @@ New format - use also initiator_ext in the connection command. .SH FILES @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf - -Default rules configuration file that indicates to which targets to connect. Can be overridden using the \fB\-f\fR \fIrules-File\fR option. +Default rules configuration file that indicates to which targets to connect. Can be overridden using the \fB\-f\fR \fIrules-file\fR option. Each line in this file is a rule which can be either an allow connection or a disallow connection according to the first character in the line (a or d accordingly). The rest of the line is values for id_ext, ioc_guid, dgid, service_id. Please take a look at the example section for an example of the file. srp_daemon decide whether to allow or disallow each target according to first rule that match the target. If no rule matches the target, the target is allowed and will be connected. In an allow rule it is possible to set attributes for the connection to the target. Supported attributes are max_cmd_per_lun and max_sect.