From 25a8802403de157bdfc39b7860ea4e3ee2b1d8ee Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Sun, 9 Oct 2016 19:32:55 +0200 Subject: main: rename "-o" option to "-ko" This prevents confusion with the "-o" options that is passed by mount(1) at the end of the command line. --- Documentation/MANPAGE.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) (limited to 'Documentation') diff --git a/Documentation/MANPAGE.md b/Documentation/MANPAGE.md index 899aac2..87265d8 100644 --- a/Documentation/MANPAGE.md +++ b/Documentation/MANPAGE.md @@ -65,6 +65,15 @@ to mount the gocryptfs filesytem without user interaction. **-init** : Initialize encrypted directory +**-ko** +: Pass additonal mount options to the kernel (comma-separated list). +FUSE filesystems are mounted with "nodev,nosuid" by default. If gocryptfs +runs as root, you can enable device files by passing the opposite mount option, +"dev", and if you want to enable suid-binaries, pass "suid". +"ro" (equivalent to passing the "-ro" option) and "noexec" may also be +interesting. For a complete list see the section +`FILESYSTEM-INDEPENDENT MOUNT OPTIONS` in mount(8). + **-longnames** : Store names longer than 176 bytes in extra files (default true) This flag is useful when recovering old gocryptfs filesystems using @@ -93,15 +102,6 @@ continue be printed to stdout and stderr. : Send USR1 to the specified process after successful mount. This is used internally for daemonization. -**-o** -: Pass additonal mount options to the kernel (comma-separated list). -FUSE filesystems are mounted with "nodev,nosuid" by default. If gocryptfs -runs as root, you can enable device files by passing the opposite mount option, -"dev", and if you want to enable suid-binaries, pass "suid". -"ro" (equivalent to passing the "-ro" option) and "noexec" may also be -interesting. For a complete list see the section -`FILESYSTEM-INDEPENDENT MOUNT OPTIONS` in mount(8). - **-openssl bool/"auto"** : Use OpenSSL instead of built-in Go crypto (default "auto"). Using built-in crypto is 4x slower unless your CPU has AES instructions and -- cgit v1.2.3