From patchwork Mon May 15 22:47:30 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bart Van Assche X-Patchwork-Id: 9728175 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 48B7260386 for ; Mon, 15 May 2017 22:48:05 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 2F8E128464 for ; Mon, 15 May 2017 22:48:05 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 244092882F; Mon, 15 May 2017 22:48:05 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 601DE288B0 for ; Mon, 15 May 2017 22:48:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752356AbdEOWsD (ORCPT ); Mon, 15 May 2017 18:48:03 -0400 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:61805 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752323AbdEOWrx (ORCPT ); Mon, 15 May 2017 18:47:53 -0400 X-IronPort-AV: E=Sophos;i="5.38,346,1491235200"; d="scan'208,223";a="114745213" Received: from mail-bl2nam02lp0080.outbound.protection.outlook.com (HELO NAM02-BL2-obe.outbound.protection.outlook.com) ([207.46.163.80]) by ob1.hgst.iphmx.com with ESMTP; 16 May 2017 06:51:47 +0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector1-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=0y+FjRyAe8/EO5K7uK55n+v+mqCfs9d/VbS0JJaLU6o=; b=Bpfvh+pX3GX/SxlPLBvZOOeExY05ICaThpKccNn3eFBcnHgr2eEtZ8i2dM6QLp8p6PwdCgGEX3oiEUXjKQYCv2OeAQXomcZTwto3Lf92kNJTCxrkBvbu8/waLo9gTXNH4+8IyA594DhIvV7H0TmJaWz0lb/qa+V7LSpO7xikTjc= Received: from BN3PR04CA0020.namprd04.prod.outlook.com (10.166.70.158) by CO2PR04MB715.namprd04.prod.outlook.com (10.141.229.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16; Mon, 15 May 2017 22:47:44 +0000 Received: from BN3NAM04FT019.eop-NAM04.prod.protection.outlook.com (2a01:111:f400:7e4e::200) by BN3PR04CA0020.outlook.office365.com (2a01:111:e400:7a4f::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16 via Frontend Transport; Mon, 15 May 2017 22:47:43 +0000 Authentication-Results: spf=pass (sender IP is 63.163.107.225) smtp.mailfrom=sandisk.com; mellanox.com; dkim=none (message not signed) header.d=none;mellanox.com; dmarc=bestguesspass action=none header.from=sandisk.com; Received-SPF: Pass (protection.outlook.com: domain of sandisk.com designates 63.163.107.225 as permitted sender) receiver=protection.outlook.com; client-ip=63.163.107.225; helo=milsmgep14.sandisk.com; Received: from milsmgep14.sandisk.com (63.163.107.225) by BN3NAM04FT019.mail.protection.outlook.com (10.152.92.173) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.1075.5 via Frontend Transport; Mon, 15 May 2017 22:47:43 +0000 Received: from MILHUBIP03.sdcorp.global.sandisk.com (Unknown_Domain [10.201.67.162]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by (Symantec Messaging Gateway) with SMTP id 2B.32.19026.E003A195; Mon, 15 May 2017 15:47:42 -0700 (PDT) Received: from milsmgip11.sandisk.com (10.177.9.6) by MILHUBIP03.sdcorp.global.sandisk.com (10.177.9.96) with Microsoft SMTP Server id 14.3.319.2; Mon, 15 May 2017 15:47:37 -0700 X-AuditID: 0ac94371-41ba798000004a52-0b-591a300e4513 Received: from exp-402881.sdcorp.global.sandisk.com ( [10.177.8.100]) by (Symantec Messaging Gateway) with SMTP id A4.E3.11415.8003A195; Mon, 15 May 2017 15:47:36 -0700 (PDT) From: Bart Van Assche To: Doug Ledford CC: , Jason Gunthorpe , Leon Romanovsky , Bart Van Assche Subject: [PATCH rdma-core 2/5] srp_daemon: Use the recommended style in the man page Date: Mon, 15 May 2017 15:47:30 -0700 Message-ID: <20170515224733.29586-9-bart.vanassche@sandisk.com> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20170515224733.29586-1-bart.vanassche@sandisk.com> References: <20170515224733.29586-1-bart.vanassche@sandisk.com> X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrGLMWRmVeSWpSXmKPExsXCddJ5kS6fgVSkwdt+IYuX5z+wWny/YWpx su8fs8WzQ70sDiwez6YfZvL4vqOX0eP9vqtsHp83yQWwRHHZpKTmZJalFunbJXBlHH9wlqmg z6ri3ORTzA2MXQZdjJwcEgImEq1bXzB3MXJxCAksZZI40/GFDcLZxijxenY/K0zV7Ds/mCAS mxklnnyZyg6SYBMwkvj2fiYLiC0ioCax6dUidpAiZoE1jBI/tvwCKxIWCJGY93QJE4jNIqAq sW/yDbCpvAL2Et9+/YLaIC9xdstOZhCbU8BB4u/Np0D1HEDb7CV+nlYDmSkh0MQq0fj/OztE r6DEyZlPwBYzC0hIHHzxAqxXSEBd4uSS+UwTGIVmISmbhaRsASPTKkax3Myc4tz01AJDE73i xLyUzOJsveT83E2MkNAu3MH4+rb3IUYBDkYlHt4VKyQjhVgTy4orcw8xSnAwK4nwcnBLRQrx piRWVqUW5ccXleakFh9ilOZgURLnzZKdGiEkkJ5YkpqdmlqQWgSTZeLglGpgDKhjSHvTVxL5 0OBz/qmu5jUTfrcHZ5o4NKnxzXmVcUpv5uUOv+YjBT8+v/mf/2pv9dVJ00Kt3jLNCWFgToiP 871bdsDwZqZBOl9FArPQt0ZVhYDvt6ZsNc+Ljir7zBNxO9youWGT+5q/HKHfZizJnPBzaZhd zdHcDnajqeJ1XcX+y5aLZHUosRRnJBpqMRcVJwIARSZ+SWkCAAA= X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrMJMWRmVeSWpSXmKPExsXCtZEjRZfDQCrS4N9va4uDP9sYLV6e/8Bq 8f2GqcXJvn/MFs8O9bI4sHo8m36YyeP7jl5Gj/f7rrJ5TFtznsnj8ya5ANYoLpuU1JzMstQi fbsErozjD84yFfRZVZybfIq5gbHLoIuRk0NCwERi9p0fTCC2kMBGRokrS91BbDYBI4lv72ey gNgiAmoSm14tYgexmQXWMEps3AsWFxYIkZj3dAlYL4uAqsS+yTdYQWxeAXuJ/Vc62CHmy0uc 3bKTGcTmFHCQ+HvzKVA9B9Aue4mfp9UmMHIvYGRYxSiWm5lTnJueWWBoqFecmJeSWZytl5yf u4kRHAyckTsYn040P8TIxMEp1cB47dq98w65vTlr3U+JLl3a0tubnmA2dVqkyxH3jIhePVs5 fTGN9Q5/X3ySMj1q9mteuqvwhi0L+Y47pC/7px1heDV0g/X5B+XhKhr57N8sPz6UvbN4XWNj 6SY5WWfRD+ziN/NmXAi5rXDBku1D48Tc/Dc+100KOp7YiL84Jvzi4PXMozlKGg5KLMUZiYZa zEXFiQCDtxd8tgEAAA== MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:63.163.107.225; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39850400002)(39400400002)(39860400002)(39410400002)(39840400002)(39450400003)(2980300002)(438002)(189002)(199003)(9170700003)(305945005)(50986999)(2950100002)(5003940100001)(189998001)(86362001)(4326008)(1076002)(50466002)(356003)(36756003)(6666003)(33646002)(2906002)(6306002)(72206003)(107886003)(6916009)(38730400002)(50226002)(110136004)(478600001)(77096006)(8676002)(81166006)(76176999)(47776003)(54906002)(5660300001)(106466001)(53936002)(8936002)(966005); DIR:OUT; SFP:1102; SCL:1; SRVR:CO2PR04MB715; H:milsmgep14.sandisk.com; FPR:; SPF:Pass; MLV:sfv; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN3NAM04FT019; 1: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 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 4afddfe1-1d3c-422d-f262-08d49be46638 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(8251501002)(2017030254075)(201703131423075)(201703031133081); SRVR:CO2PR04MB715; X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 3:dLhR3vbQzCCiJ0jI2dddQkOPIIFNaym4zKucjJ1+D8E7nouAUGkeJMpjFT0W+UiJwkfx7qaJeco3MqY6foAzyDLSMPp6tKtHbd2IUNQULSKb7H/RlxJ//KMVRaO+myuqrRtu0l9mFjYodlIj/LJzJsIoipIyZSKkMzpGM9Z+2ZQA7jQtMQEp5M1jBSfKT0OnSp9J4L3gPgizku7d8nu9efwFGiIeDwzggCsi1xdyfHpcy+u/FpE6G4qtiyVIjGDt44GnYGmdrS2a9NG9TKdo6NU1g0+W8BKbmez0CQAAgcLTNEdWF46xT/L334cZ45BLCbitL5VakcdpX7xVytwEuR5ZPQGBcORe9qG6e8dzxF/wGoI85BVH+i1gR/INaefA800bbTMPX11EwPG0N8mUGFWFeag/ZPC2ic6c1rFEh/k6zjvmMqPfOrme0/tpnA+sb1cX52XqzpW3h8MM0bxNTbplE6MdqwXfnchNQZ3v1iktjlnreKfMLkVmmlNwKRI2 X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 25:5qcKvfbTNlYcXR2DC/8a0qQUEu6p//ZY1YEWs/pdQmOr2mDrWWhnngzmpjZTQ4llZLklkBpNHGKiRPp02N5/PR3onJt+WWkCTge9V9WJXfTmID78SullCBrJrZs2oyCYeGxeWkWkasUpDV9+iVFNDDxwpnlmGr/8JrBGgHlqxnKyXTImAKfL2X22+i3kJYxj1AiJ53HhUuOiGoQCBllAgOYWIad+vakLrNgGtxHIw/flrG7LwdVjUAxKih34UHvzdsoZpjAAbg/+AgnPw8ZUdJ4JhfghkPx7rLYe/Ql3WVuN02qHAxXyjOOWnLwYo/PcMC2VAXLSCmffsInJZawuW7uggqpJ55NZkiy4YpwRvICxoRWyylqtm4aWq6favbX0mEcHkUP/HaY+rvei5Qk3hQ8apgyA+RD2AiazIJMqbDNJ+mpiB0M8lcNDzOZStgQF7kpnGB2CUeYtc8E8NWlR0Q6gX3gEjblOjo6vgVbRnzw=; 31:0OMvjShbnlMv3BDaqw1OL6DtHfVK3jYq+lrlZcoyoQS024bMFVfw9pjbKLmxGtWU3v/2JUvIv7FIpH0OeN6EI4Ct6RpX8Vu2DUt22jy5pL7DGdtcFbK6sS0fGbj2fwQyqkPmBjdOxR/ygNztPLowqsaG2DVBM7/+sPO4M/AvO+uZUnqznYS7Fp9ySygqHhps2ciFiDQJmJUks4qgx5AoS2bzwJFSQmC2Duwqu0jg3Lq8ArFhhTt2H1Aoe3EFMJX9eZauChwtCu0U896YJhvAvw== WDCIPOUTBOUND: EOP-TRUE X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 20:dwV/e3nMbEUNbu6iGoI7JdsUCS5+d/d5UdM17g8Yy8VxNT0aw3R2CsaUSFgdA75+dSeeQIGU3By4cIxCT7sf3OrFj/q5ZPg5HGqZyrHrKUlax/0taCGe//5oSJ0z7N+oGjpy4QABKRR4AO+c680+8p8303MMgyNOxfNjCT+sb5lFmxls4+2+7YILMI6HYONIG7XXhIdQLdXhRJFnNK1+EpFKojaGy8ygWnjnlwsui9hMos331hWzS5TXIH19aArBVuvTM64fkZFudNG4rddA4JyFM7RiwRd8+UKjx5jFy1HvFP3g+WfW7VDC0N8qXgNcvb2sRnp5ivFs1UCwUyXv07DLbZmoP3C9akJQzDHU2B5CciZLBvgiM5FbxAsqZ4NHmCtPsV0A1CzjZisEM0XFVoaadaH/b1RUBJSzZkhswN2/QiPSCiYSBZdb8YlWNPjZFl3ys7avlyoSyxE16Rgk0ZfAoVs4VeUVIuftaqaov+IOMIA+zbPc+VP78kZrCqZP X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(21532816269658)(42932892334569); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(13016025)(5005006)(13018025)(8121501046)(93006095)(93004095)(10201501046)(3002001)(6055026)(6041248)(20161123558100)(20161123555025)(20161123560025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(6072148); SRVR:CO2PR04MB715; BCL:0; PCL:0; RULEID:; SRVR:CO2PR04MB715; X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 4: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 = X-Forefront-PRVS: 0308EE423E X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR04MB715; 23:Qp+KatB4vrFr+qAATPs7EGkVTjLBUMK8mWX0EuOaPg?= =?us-ascii?Q?HFumJ543WYhxE+hcyyP6eX8Sms2CBJapWE0VnXiPLcTXsGzN1WZgrsmv6fVK?= =?us-ascii?Q?Z6F0e6fQzCR5G/KQOxnvcUj+ist3udAO85bBIF2AiKY0dW3iL09IzXUpZl37?= =?us-ascii?Q?M25PDVRBG6lQTKVQRtiHItAJkMmmfDSt3sa0xnobfZxK9j7rql2vzlPgb7ca?= =?us-ascii?Q?EDEp/mdOXl7BWGOwKegKo2NjRn2XTtz+i0CR8ziL+lTpubydAPIVXNLYM9Wx?= =?us-ascii?Q?FQEFJbCE5UWrnNMhx1YVZ9QnIkgcC3D8kz7F6DRTkane/NmVke/3PtARKYQl?= =?us-ascii?Q?qct6nbrRDV571A76gZZ7A/qo0LKqLCI7x+ofIbFd6tCbbemNwzdXnL1chia/?= =?us-ascii?Q?+4KfwlCAR/9oG4HVT6wPRf3kUmJcCdJO8qMQ51JTdyuXIFb/7g91hbyi5d3o?= =?us-ascii?Q?R81nLIhcMQBl49ua1eVINxoCh3LBnrhGjLxz4xlD/V1NetIyFtIxdcBp9NJH?= =?us-ascii?Q?iRIIkrUczeaVJ65Jqk+UhnHeJDXm1mxlOyLL9dtv5RziT0/v6QcG+PiwVd3H?= =?us-ascii?Q?c5RIIg7syaO3o2bK5nCfezS4Z/40VH+QY3fliYeUfz/cMWbtwI3guI5SJfm8?= =?us-ascii?Q?nImbwvPqoyEK/f+nST6c80VaF23KrZNacY45/mfeh/ChBdUoeIoiSt6+jzj6?= =?us-ascii?Q?TfZlZ8kXI6F6IJgMPCo46UQBfC2c80PHb/uhEh7ccVib98SCnmHynAnHrf/T?= =?us-ascii?Q?uyPMaHdlSjuAgqAKOfDy1zl6D7U+A5BbD0de81uQUyiyKHUahVJ9H07Bl2g0?= =?us-ascii?Q?X6Xvmr6Afr5BN4ktZu9QoYuWgEPpMEquZbXFth6I6csO1Na6hzjFatI7u2FM?= =?us-ascii?Q?VTkOrGj8JzLKEqC1V8iYcoPNpswmslxnP33sg48CChH4YGs9ZvI1HoZNxlsv?= =?us-ascii?Q?xEwHzCGp2oRx4l3c1d5hgWwh5GKDTUf1o4m3bAOiYzHuYhNoIfADy1aTo+Ch?= =?us-ascii?Q?afNkPu6JqCrmiULbTDWWoe70THqblt4kuE3oLWpvDTL5JrEu5XbNZ1E5qH8w?= =?us-ascii?Q?XU8ieW3Y/jtVs3pufw+1iKXUFnN8sk0bmKNk++2BVWUTaDYIY1b5HIvSgKC5?= =?us-ascii?Q?1YyprbpTs=3D?= X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 6: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; 5:RbXODCzfOrwiZg2ka0YbXmrWE+Iw+sqqtn+9JRV1v1eXr6dz7VY/6qgsE4YCXeYtA1p1YzdJ6iCH4pcyEMrYxFwLaf/jPIqtBpVnt9mLV7FOMBJZMWaoqZnc8BNQsEPNi5pTCLyj6jv+llwLPk68AA==; 24:yi+CAKjUaTwSsrQVNN1uc+hquINTmcJJwBbDzZ09/SAs220cOZATUQz84YZ9Gjm4FX4Bu7Ej0yturXH3+4Buy6ppqJgvyI4xrObUAr4vsMY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CO2PR04MB715; 7:DU0vBIJAuOVolFielXhTPdzJV14n02QJPwaz2YGpxNh5mGT8GJGFpYk5d0EDm2AKLAuU8OLCBlRuZDFq28wDKjsOwtm7OowOOtk6g3byJxIhAK5El8VcYM59tPYFTkDY+Nn5SmDPXra3yPqdY+HpZtnk1DEP0GeEhVfSZQE2B1cd8DyQe+nx0uUGPlVQaQawKYPXEDCLvlZObJq486fnDcooMP9EWC8tX5x6BKYHRWuAHuvwO5tVz7sfG8fIJqXewtdfohIr96A3ihb6g+OSZMaH7j3QU+bhQldgUFHGwkO8awGp00yME8H4z5PEvvd/0fnr2BhRbq2R5WICo+MQag==; 20:rcbQislY1WMwZiwbAtZEqenBkzRQN+KggmGuvco8aGJavNog4Jw3d9Is6F86Rk7v4HouFDGz+cI8Xhoz7b5g4w4PTT3+ItJc6GikUT1wBCgDbBMywBnfIjvAOjsHux0z3DQzs5fqXVOMPyM2OBaogo+XkSMzeP5zaskDX0RnLdY= X-OriginatorOrg: sandisk.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 May 2017 22:47:43.1720 (UTC) X-MS-Exchange-CrossTenant-Id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=b61c8803-16f3-4c35-9b17-6f65f441df86; Ip=[63.163.107.225]; Helo=[milsmgep14.sandisk.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR04MB715 Sender: linux-rdma-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-rdma@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From https://liw.fi/manpages/, about the SYNOPSIS section: Font usage is important here, and carries information. All the parts that are in bold are things that the user is expected to write verbatim. Italic indicates values the user is expected to fill in. Normal font is used for syntax meta-characters: for the brackets that indicate optionality, and the ellipsis that indicates repetition. Additionally, change the identifiers that refer to arguments to lower case. Signed-off-by: Bart Van Assche --- srp_daemon/srp_daemon.1.in | 41 +++++++++++++++++++++++++++-------------- 1 file changed, 27 insertions(+), 14 deletions(-) diff --git a/srp_daemon/srp_daemon.1.in b/srp_daemon/srp_daemon.1.in index 008d53a2..02e1f2df 100644 --- a/srp_daemon/srp_daemon.1.in +++ b/srp_daemon/srp_daemon.1.in @@ -5,18 +5,30 @@ srp_daemon \- Discovers SRP targets in an InfiniBand Fabric .SH SYNOPSIS -.B srp_daemon [-vVcaeon] [-d \fIumad-device\fR | -i \fIinfiniband-device\fR [-p \fIport-num\fR]] [-t \fItimeout(ms)\fR] [-r \fIretries\fR] [-R \fIRescan-time\fR] [-f \fIrules-File\fR] +.B srp_daemon\fR [\fB-vVcaeon\fR] [\fB-d \fIumad-device\fR | \fB-i \fIinfiniband-device\fR [\fB-p \fIport-num\fR]] [\fB-t \fItimeout(ms)\fR] [\fB-r \fIretries\fR] [\fB-R \fIrescan-time\fR] [\fB-f \fIrules-file\fR] .SH DESCRIPTION .PP Discovers and connects to InfiniBand SCSI RDMA Protocol (SRP) targets in an IB fabric. -Each srp_daemon instance operates on one local port. Upon boot it performs a full rescan of the fabric then waits for an srp_daemon event. An srp_daemon event can be a join of a new machine to the fabric, a change in the capabilities of a machine, an SA change, or an expiration of a predefined timeout. +Each srp_daemon instance operates on one local port. Upon boot it performs a +full rescan of the fabric and then waits for an srp_daemon event. An +srp_daemon event can be a join of a new machine to the fabric, a change in the +capabilities of a machine, an SA change, or an expiration of a predefined +timeout. -When a new machine joins the fabric, srp_daemon checks if it is a target. When there is a change of capabilities, srp_daemon checks if the machine has turned into a target. When there is an SA change or a timeout expiration, srp_daemon performs a full rescan of the fabric. +When a new machine joins the fabric, srp_daemon checks if it is an SRP +target. When there is a change of capabilities, srp_daemon checks if the +machine has turned into an SRP target. When there is an SA change or a timeout +expiration, srp_daemon performs a full rescan of the fabric. -For each target srp_daemon finds, it checks if it should connect to this target according to its rules (default rules file is @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf) and if it is already connected to the local port. If it should connect to this target and if it is not connected yet, srp_daemon can either print the target details or connect to it. +For each target srp_daemon finds, it checks if it should connect to this +target according to its rules (the default rules file is +@CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf) and if it is already +connected to the local port. If it should connect to this target and if it is +not connected yet, srp_daemon can either print the target details or connect +to it. .SH OPTIONS @@ -42,24 +54,25 @@ Generate output suitable for piping directly to a /sys/class/infiniband_srp/srp\-\-/add_target file. .TP \fB\-a\fR -Prints all the targets in the fabric, not only targets that are not connected through the local port. (The same as ibsrpdm.) +Prints all the targets in the fabric, not only targets that are not connected +through the local port. This is the same behavior as that of ibsrpdm. .TP \fB\-e\fR Execute the connection command, i.e., make the connection to the target. .TP \fB\-o\fR -Perform only one rescan and exit. (The same as ibsrpdm.) +Perform only one rescan and exit just like ibsrpdm. .TP -\fB\-R\fR \fIRescan-time\fR -Force a complete rescan every \fIRescan-time\fR seconds. If -R is not specified, no timeout rescans will be performed. +\fB\-R\fR \fIrescan-time\fR +Force a complete rescan every \fIrescan-time\fR seconds. If -R is not specified, no timeout rescans will be performed. .TP -\fB\-T\fR \fIretry-Timeout\fR -Retries to connect to existing target after \fIretry-Timeout\fR seconds. If -R is not specified, uses 5 Seconds timeout. if retry-Timeout is 0, will not try to reconnect. The reason srp_daemon retries to connect to the target is because there may be a rare scnerio in which srp_daemon will try to connect to add a target when the target is about to be removed, but is not removed yet. +\fB\-T\fR \fIretry-timeout\fR +Retries to connect to existing target after \fIretry-timeout\fR seconds. If -R is not specified, uses 5 Seconds timeout. if retry-timeout is 0, will not try to reconnect. The reason srp_daemon retries to connect to the target is because there may be a rare scnerio in which srp_daemon will try to connect to add a target when the target is about to be removed, but is not removed yet. .TP -\fB\-f\fR \fIrules-File\fR -Decide to which targets to connect according to the rules in \fIrules-File\fR. +\fB\-f\fR \fIrules-file\fR +Decide to which targets to connect according to the rules in \fIrules-file\fR. If \fB\-f\fR is not specified, uses the default rules file @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf. -Each line in the \fIrules-File\fR is a rule which can be either an allow connection or a disallow connection according to +Each line in the \fIrules-file\fR is a rule which can be either an allow connection or a disallow connection according to the first character in the line (a or d accordingly). The rest of the line is values for id_ext, ioc_guid, dgid, service_id. Please take a look at the example section for an example of the file. srp_daemon decide whether to allow or disallow each target according to first rule that match the target. If no rule matches the target, the target is allowed and will be connected. In an allow rule it is possible to set attributes for the connection to the target. Supported attributes are max_cmd_per_lun and max_sect. .TP @@ -74,7 +87,7 @@ New format - use also initiator_ext in the connection command. .SH FILES @CMAKE_INSTALL_FULL_SYSCONFDIR@/srp_daemon.conf - -Default rules configuration file that indicates to which targets to connect. Can be overridden using the \fB\-f\fR \fIrules-File\fR option. +Default rules configuration file that indicates to which targets to connect. Can be overridden using the \fB\-f\fR \fIrules-file\fR option. Each line in this file is a rule which can be either an allow connection or a disallow connection according to the first character in the line (a or d accordingly). The rest of the line is values for id_ext, ioc_guid, dgid, service_id. Please take a look at the example section for an example of the file. srp_daemon decide whether to allow or disallow each target according to first rule that match the target. If no rule matches the target, the target is allowed and will be connected. In an allow rule it is possible to set attributes for the connection to the target. Supported attributes are max_cmd_per_lun and max_sect.