|
Lines 51-57
Link Here
|
| 51 |
by previously running |
51 |
by previously running |
| 52 |
.Nm |
52 |
.Nm |
| 53 |
instances, removes LUNs no longer existing in the configuration file, |
53 |
instances, removes LUNs no longer existing in the configuration file, |
| 54 |
and creates new LUNs as neccessary. |
54 |
and creates new LUNs as necessary. |
| 55 |
After that it listens for the incoming iSCSI connections, performs |
55 |
After that it listens for the incoming iSCSI connections, performs |
| 56 |
authentication, and, if successful, passes the connections to the kernel part |
56 |
authentication, and, if successful, passes the connections to the kernel part |
| 57 |
of CTL iSCSI target, which handles it from that point. |
57 |
of CTL iSCSI target, which handles it from that point. |
|
Lines 59-65
Link Here
|
| 59 |
When it receives a SIGHUP signal, the |
59 |
When it receives a SIGHUP signal, the |
| 60 |
.Nm |
60 |
.Nm |
| 61 |
reloads its configuration and applies the changes to the kernel. |
61 |
reloads its configuration and applies the changes to the kernel. |
| 62 |
Changes are applied in a way that avoids unneccessary disruptions; |
62 |
Changes are applied in a way that avoids unnecessary disruptions; |
| 63 |
for example removing one LUN does not affect other LUNs. |
63 |
for example removing one LUN does not affect other LUNs. |
| 64 |
.Pp |
64 |
.Pp |
| 65 |
When exiting gracefully, the |
65 |
When exiting gracefully, the |