Changeset 5159:b226b74be970 in roaraudio for doc/man1/roard.1


Ignore:
Timestamp:
10/16/11 12:42:31 (13 years ago)
Author:
phi
Branch:
default
Phase:
public
Message:

Updated manpages (pr1)

File:
1 edited

Legend:

Unmodified
Added
Removed
  • doc/man1/roard.1

    r5146 r5159  
    3838Sets default memory locking level to LEVEL. 
    3939 
     40Valid levels are: 
     41.RS 
     42.TP 
     43\fBnone\fR 
     44No memory is locked at all. 
     45 
     46.TP 
     47\fBlow\fR 
     48Only very few (important) objects are locked in memory. 
     49 
     50.TP 
     51\fBmedium\fR 
     52Few (important) objects are locked in memory. 
     53 
     54.TP 
     55\fBhigh\fR 
     56Many objects are locked in memory. 
     57 
     58.TP 
     59\fBnearlyall\fR 
     60All known objects are locked in memory. 
     61 
     62.TP 
     63\fBnearlyallsys\fR 
     64All known objects are locked in memory but also pages provided by the system like stack and heap. 
     65 
     66.TP 
     67\fBallcur\fR 
     68All currently used pages are locked in memory. 
     69 
     70.TP 
     71\fBall\fR 
     72All pages (including future allocated pages) are locked in memory. 
     73 
     74.TP 
     75\fBdefault\fR 
     76Use defaults (the default). 
     77 
     78.RE 
     79 
     80A higher memlock level may result in memory allocations problems at runtime and even segfauls on some systems. 
     81(VM killed processes). Check your current system limits before altering this value. 
     82 
    4083.TP 
    4184\fB--pidfile PIDFILE\fR 
     
    138181 
    139182.SH "AUTH OPTIONS" 
    140 .TP 
    141 \fB--guest-acclev\fR 
     183The following options control the access rights of connections. 
     184Some of them take an access level. The access level is one from the following list: 
     185.RS 
     186.TP 
     187\fBnone\fR 
     188This is used to disable an authentication method. 
     189 
     190.TP 
     191\fBidented\fR 
     192Used internally. Should not be used. 
     193 
     194.TP 
     195\fBconctl\fR 
     196The client is only allowed to do some basic operations only affecting it's own connection. 
     197 
     198.TP 
     199\fBguest\fR 
     200Guest access (read only). The client may list resources but not alter them. 
     201 
     202.TP 
     203\fBuser\fR 
     204Normal user. The client may create and alter most resources. 
     205 
     206.TP 
     207\fBpwruser\fR 
     208Power User. The client can create and alter all resources and do all operation but operations 
     209which would break the POSIX right system. The user is not allowed to control the server itself 
     210like terminating it or alter (system) resources with the rights of the user runnung roard. 
     211 
     212This is the access level a fully trusted user in a multi user setup should have. 
     213 
     214.TP 
     215\fBall\fR 
     216The client can do everything. This includes operations which may alter system resources (like files) 
     217with the rights of the user running roard. 
     218 
     219This accesslevel should be given to the user in case of a single user setup or root or some administrator 
     220in a multi user setup. 
     221.RE 
     222 
     223.TP 
     224\fB--guest-acclev ACCESSLEVEL\fR 
    142225Sets the access level for guest connections. Set to "none" to disable guest access. 
    143226 
    144227.TP 
    145 \fB--trust-acclev\fR 
     228\fB--trust-acclev ACCESSLEVEL\fR 
    146229Sets the access level for clients authenticated by trust auth. 
    147230Set to "none" to disable trust auth. 
Note: See TracChangeset for help on using the changeset viewer.