svn commit: r355486 - head/sbin/mount_fusefs

Jens Schweikhardt schweikh at FreeBSD.org
Sat Dec 7 15:17:01 UTC 2019


Author: schweikh
Date: Sat Dec  7 15:17:00 2019
New Revision: 355486
URL: https://svnweb.freebsd.org/changeset/base/355486

Log:
  Correct a handful of typos/grammos.

Modified:
  head/sbin/mount_fusefs/mount_fusefs.8

Modified: head/sbin/mount_fusefs/mount_fusefs.8
==============================================================================
--- head/sbin/mount_fusefs/mount_fusefs.8	Sat Dec  7 14:17:56 2019	(r355485)
+++ head/sbin/mount_fusefs/mount_fusefs.8	Sat Dec  7 15:17:00 2019	(r355486)
@@ -60,7 +60,7 @@ Basic usage is to start a fuse daemon on the given
 file.
 In practice, the daemon is assigned a
 .Ar special
-file automatically, which can then be indentified via
+file automatically, which can then be identified via
 .Xr fstat 1 .
 That special file can then be mounted by
 .Nm .
@@ -100,7 +100,7 @@ is an integer it will be interpreted as the number
 of the file descriptor of an already open fuse device
 (used when the Fuse library invokes
 .Nm .
-(See
+See
 .Sx DAEMON MOUNTS ) .
 .Pp
 The options are as follows:
@@ -181,7 +181,7 @@ are supported by the Fuse library.
 One can list these by passing
 .Fl h
 to a Fuse daemon.
-Most of these options only have affect on the behavior of the daemon (that is,
+Most of these options only have effect on the behavior of the daemon (that is,
 their scope is limited to userspace).
 However, there are some which do require in-kernel support.
 Currently the options supported by the kernel are:
@@ -209,7 +209,7 @@ has the same effect as
 This is the recommended usage when you want basic usage
 (eg, run the daemon at a low privilege level but mount it as root).
 .Sh STRICT ACCESS POLICY
-The strict access policy for Fuse filesystems lets one to use the filesystem
+The strict access policy for Fuse filesystems lets one use the filesystem
 only if the filesystem daemon has the same credentials (uid, real uid, gid,
 real gid) as the user.
 .Pp
@@ -222,7 +222,7 @@ This is to shield users from the daemon
 .Dq spying
 on their I/O activities.
 .Pp
-Users might opt to willingly relax strict access policy (as far they
+Users might opt to willingly relax strict access policy (as far as they
 are concerned) by doing their own secondary mount (See
 .Sx SHARED MOUNTS ) .
 .Sh SHARED MOUNTS
@@ -259,13 +259,13 @@ However, given that
 is capable of invoking an arbitrary program, one must be careful when doing this.
 .Nm
 is designed in a way such that it makes that easy.
-For this purpose, there are options which disable certain risky features (
-.Fl S
+For this purpose, there are options which disable certain risky features
+.Fl ( S
 and
 .Fl A ) ,
 and command line parsing is done in a flexible way: mixing options and
 non-options is allowed, but processing them stops at the third non-option
-argument (after the first two has been utilized as device and mountpoint).
+argument (after the first two have been utilized as device and mountpoint).
 The rest of the command line specifies the daemon and its arguments.
 (Alternatively, the daemon, the special and the mount path can be
 specified using the respective options.) Note that


More information about the svn-src-all mailing list