Changeset 5159:b226b74be970 in roaraudio for doc/man1/roard.1
- Timestamp:
- 10/16/11 12:42:31 (13 years ago)
- Branch:
- default
- Phase:
- public
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/man1/roard.1
r5146 r5159 38 38 Sets default memory locking level to LEVEL. 39 39 40 Valid levels are: 41 .RS 42 .TP 43 \fBnone\fR 44 No memory is locked at all. 45 46 .TP 47 \fBlow\fR 48 Only very few (important) objects are locked in memory. 49 50 .TP 51 \fBmedium\fR 52 Few (important) objects are locked in memory. 53 54 .TP 55 \fBhigh\fR 56 Many objects are locked in memory. 57 58 .TP 59 \fBnearlyall\fR 60 All known objects are locked in memory. 61 62 .TP 63 \fBnearlyallsys\fR 64 All known objects are locked in memory but also pages provided by the system like stack and heap. 65 66 .TP 67 \fBallcur\fR 68 All currently used pages are locked in memory. 69 70 .TP 71 \fBall\fR 72 All pages (including future allocated pages) are locked in memory. 73 74 .TP 75 \fBdefault\fR 76 Use defaults (the default). 77 78 .RE 79 80 A higher memlock level may result in memory allocations problems at runtime and even segfauls on some systems. 81 (VM killed processes). Check your current system limits before altering this value. 82 40 83 .TP 41 84 \fB--pidfile PIDFILE\fR … … 138 181 139 182 .SH "AUTH OPTIONS" 140 .TP 141 \fB--guest-acclev\fR 183 The following options control the access rights of connections. 184 Some of them take an access level. The access level is one from the following list: 185 .RS 186 .TP 187 \fBnone\fR 188 This is used to disable an authentication method. 189 190 .TP 191 \fBidented\fR 192 Used internally. Should not be used. 193 194 .TP 195 \fBconctl\fR 196 The client is only allowed to do some basic operations only affecting it's own connection. 197 198 .TP 199 \fBguest\fR 200 Guest access (read only). The client may list resources but not alter them. 201 202 .TP 203 \fBuser\fR 204 Normal user. The client may create and alter most resources. 205 206 .TP 207 \fBpwruser\fR 208 Power User. The client can create and alter all resources and do all operation but operations 209 which would break the POSIX right system. The user is not allowed to control the server itself 210 like terminating it or alter (system) resources with the rights of the user runnung roard. 211 212 This is the access level a fully trusted user in a multi user setup should have. 213 214 .TP 215 \fBall\fR 216 The client can do everything. This includes operations which may alter system resources (like files) 217 with the rights of the user running roard. 218 219 This accesslevel should be given to the user in case of a single user setup or root or some administrator 220 in a multi user setup. 221 .RE 222 223 .TP 224 \fB--guest-acclev ACCESSLEVEL\fR 142 225 Sets the access level for guest connections. Set to "none" to disable guest access. 143 226 144 227 .TP 145 \fB--trust-acclev \fR228 \fB--trust-acclev ACCESSLEVEL\fR 146 229 Sets the access level for clients authenticated by trust auth. 147 230 Set to "none" to disable trust auth.
Note: See TracChangeset
for help on using the changeset viewer.